SOFTWARE SECURITY

Cyber Security State of Tech in 2022

August 4, 2022

Cyber Security State of Tech in 2022
The Coronavirus pandemic accelerated technology adoption in ways thought unimaginable just a few short years ago. But in the background and often without much fanfare, cybercrime grew far worse. Threat actors continued their work – often backed by millions of dollars from hostile foreign governments – to penetrate networks and wreak havoc on digital infrastructures

Spotlight

FoxGuard Solutions, Inc.

"FoxGuard Solutions provides cyber security, regulatory compliance and industrial computing solutions for critical infrastructure entities and control system vendors. As a wholly-owned subsidiary of CCS-Inc., we are an operational technology (OT) company that delivers reliable, secure, and configurable solutions to solve technology and compliance challenges. FoxGuard has 33 years of experience in the design, manufacture, and life-cycle management of industrial Human Machine Interface (HMIs), Historians, and SCADA devices to offer field-tested solutions created specifically for Industrial Control System (ICS) environments. FoxGuard has over 10 years of cyber security consultation and architecture design expertise in the areas of vulnerability scanning, penetration testing, incident response, disaster recovery and continuing operations planning, and vulnerability mitigation."

OTHER WHITEPAPERS
news image

Cisco Spaces – Privacy and Data Protection

whitePaper | December 2, 2022

Cisco Spaces is an indoor location services cloud platform that provides wireless customers with rich locationbased services, including location analytics, business insight, customer experience management, asset tracking, Bluetooth Low Energy (BLE) management, and API.

Read More
news image

Cloud-Native Ransomware – How attacks on availability leverage cloud services

whitePaper | December 13, 2022

Ransomware is a financially motivated crime with the goal of inhibiting business systems and obtaining a ransom payment. Historically, ransoming data residing in traditional on-premises enterprise workloads and government systems have resulted in ample financial gain for assailants using ransomware attacks.

Read More
news image

Unify data security, privacy, and governance with contextual data classification

whitePaper | November 29, 2022

Enterprise data can be a transformative asset. It can unlock insights and intelligence to fuel innovation, accelerate organizational growth, and create a significant competitive advantage — so long as it’s properly used.

Read More
news image

Security Pillar AWS Well-Architected Framework

whitePaper | October 18, 2022

Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon.

Read More
news image

How MX Protects Your Data

whitePaper | December 22, 2022

MX’s approach to security includes a defense-in-depth strategy. This strategy is supported by an established, operational MX Security Program, with a robust suite of governing policies, processes, security controls, and procedures to achieve MX’s security strategy. MX enacts defense in depth by hardening each layer of MX’s infrastructure and supporting processes.

Read More
news image

CISA Stakeholder-Specific Vulnerability Categorization Guide

whitePaper | November 9, 2022

The CISA Stakeholder-Specific Vulnerability Categorization (SSVC) is a customized decision tree model that assists in prioritizing vulnerability response for the United States government (USG), state, local, tribal, and territorial (SLTT) governments; and critical infrastructure (CI) entities. This document serves as a guide for evaluating vulnerabilities using the CISA SSVC decision tree. The goal of SSVC is to assist in prioritizing the remediation of a vulnerability basedon the impact exploitation would have to the particular organization(s).

Read More

Spotlight

FoxGuard Solutions, Inc.

"FoxGuard Solutions provides cyber security, regulatory compliance and industrial computing solutions for critical infrastructure entities and control system vendors. As a wholly-owned subsidiary of CCS-Inc., we are an operational technology (OT) company that delivers reliable, secure, and configurable solutions to solve technology and compliance challenges. FoxGuard has 33 years of experience in the design, manufacture, and life-cycle management of industrial Human Machine Interface (HMIs), Historians, and SCADA devices to offer field-tested solutions created specifically for Industrial Control System (ICS) environments. FoxGuard has over 10 years of cyber security consultation and architecture design expertise in the areas of vulnerability scanning, penetration testing, incident response, disaster recovery and continuing operations planning, and vulnerability mitigation."

Events