Vulnerabilities in Zeek Ethercat Plugin

CISA recently announced some vulnerabilities in the Zeek Ethercat plugin: https://www.cisa.gov/news-events/ics-advisories/icsa-24-051-02 https://www.securityweek.com/zeek-security-tool-vulnerabilities-allow-ics-network-hacking/ The Zeek Ethercat plugin is included in Security […]

Read More
Women in Cybersecurity: Rocking Code Ahead of Their Time

Women in Cybersecurity: Rocking Code Ahead of Their Time

March 1st kicks off Women’s History Month in the U.S., which was launched in 1987 as a celebration of women’s contributions to history, culture, and society. To celebrate, we’re highlighting women who were pioneers in the field of cybersecurity. 
Their contributions in the areas of coding, analysis, pattern matching, and computing laid the foundation for today’s cyber defenses. These ladies were rocking code before the internet was invented.

Read More

Perimeter Security Policy

As the saying goes, a chain is only as strong as its weakest link. This applies more than ever to cybersecurity implementations designed to protect organizations from malicious attacks, intruders and vulnerabilities. While security principles should apply throughout the organization, locking down the perimeter and ensuring only necessary connections get through is an especially critical …

Read More

Comparison Chart: VPN Service Providers (Free Download)

Selecting the right virtual private network provider for your needs requires a fair bit of legwork because the choices are many and the offerings vary greatly. This quick-glance chart from TechRepublic Premium is blank and to be filled in by the user. The idea is to round up the top contenders and compare them across …

Read More
X