Enforce a Zero Trust Security Model in Today's Hostile Environment

February 2, 2020

Companies of all types are pursuing digital transformation. The goal is to improve customer value, operate with greater efficiency and agility, and increase innovation. But as companies leverage new cloud and DevOps workflows to build their digital business, security has not kept pace. As infrastructure becomes more permeable to

Spotlight

PFP Cybersecurity (Power Fingerprinting)

A disruptive cybersecurity company, PFP offers a physics-based integrity assessment of hardware, firmware, and core OS components. Once base lined, PFP detects both active and dormant attacks. It has been proven in detecting malware and hardware Trojans in mobile devices, PLC/SCADA, routers and semiconductor (FPGA), etc. It can also detect counterfeits. Received contracts from NSF, US ARMY, USAF, DARPA, and DHS. PFP is a portfolio company of the CIT GAP Fund and Blu Venture Investors. Selected as one of 2014 SINET 16 top emerging cybersecurity companies.

OTHER WHITEPAPERS
news image

Ransomware: How to prevent, predict, detect & respond

whitePaper | January 9, 2020

The malicious programs known as ransomware have attracted a significant amount of coverage in the mainstream media over the last few years, as major companies and organizations announced that their operations had been affected by the threat. Examples of affected businesses include hospitals, universities and major international corporations [2, 3]. Despite the alarming nature of the threat, the way ransomware gains entry onto a user’s device is actually no different from the methods used by other threats. Ransomware is most commonly spread by two methods.

Read More
news image

AWS Best Practices for DDoS Resiliency

whitePaper | December 5, 2019

You work to protect your business from the impact of Distributed Denial of Service (DDoS) attacks, as well as other cyberattacks. You want to keep your customers’ trust in your service by maintaining the availability and responsiveness of your application. And you want to avoid unnecessary direct costs when your infrastructure must scale in response to an attack.

Read More
news image

Cybersecurity Whitepaper 2018

whitePaper | December 12, 2019

Most of the Small to medium-sized companies are unaware about the ways in which they’re vulnerable. More than 45% mistakenly believe they’re not a viable victim. They are just too small a target in comparison to larger organizations and tend to have a blind eye towards the cyber threats they face, which is in sharp contrast to what attackers think.

Read More
news image

Scenarios for the Future of Cybercrime - White Paper for Decision Makers

whitePaper | January 28, 2020

Project 2020 is an initiative of the International Cyber Security Protection Alliance (ICSPA). Its aim is to anticipate the future of cybercrime, enabling governments, businesses and citizens to prepare themselves for the challenges and opportunities of the coming decade. It comprises a range of activities, including common threat reporting, scenario exercises, policy guidance and capacity building.

Read More
news image

Warring State - China's cybersecurity strategy

whitePaper | December 1, 2019

Cyberspace and information technology have enabled the economic, political, and cultural inte - gration of the United States and China. However, interdependence creates costs as well as benefits. Increased interconnection has also contributed to major obstacles in the bilateral relationship, generating mutual distrust of incentives, actions, and norms in cyberspace. Information technology raises new challenges for states by allowing actors to exploit networks, conduct cyber espionage, or compromise national security with greater ease.

Read More
news image

Avoiding the Security Pitfalls of Digital Transformation

whitePaper | April 1, 2020

Avoiding the Security Pitfalls of Digital Transformation is a webinar that will explore how organizations can cut through the noise and make a success of cloud transformation, leveraging the benefits of cloud technologies including efficiency, agility and scalability while avoiding the pitfalls.

Read More

Spotlight

PFP Cybersecurity (Power Fingerprinting)

A disruptive cybersecurity company, PFP offers a physics-based integrity assessment of hardware, firmware, and core OS components. Once base lined, PFP detects both active and dormant attacks. It has been proven in detecting malware and hardware Trojans in mobile devices, PLC/SCADA, routers and semiconductor (FPGA), etc. It can also detect counterfeits. Received contracts from NSF, US ARMY, USAF, DARPA, and DHS. PFP is a portfolio company of the CIT GAP Fund and Blu Venture Investors. Selected as one of 2014 SINET 16 top emerging cybersecurity companies.

Events