by Gate 15 | May 1, 2019 | Uncategorized
On 05 Mar 2019, Trend Micro posted, “Exposed IoT Automation Servers and Cybercrime,” a fascinating look at Complex IoT Environments (CIEs) and have also shared a fuller understanding of their findings in “Cybersecurity Risks in Complex IoT Environments: Threats...
by Gate 15 | Mar 1, 2019 | Uncategorized
By Omar Tisza As cyber-adversaries become sophisticated in their attacks against critical infrastructure, we see the level of sophistication between nation state and criminal threat actors increasingly blur as both groups seem to use many of the same tools and tactics...
by Gate 15 | Feb 4, 2019 | Uncategorized
by Omar Tisza With January already in the rearview mirror–and the proliferation of complex and blended threatsgrabbing the attention of more and more security practitioners like high beams on a semi-truck–we have curated poignant examples of threats, attacks, and...
by Gate 15 | Jan 2, 2019 | Uncategorized
By Omar Tisza In our quest to continue exploring salient examples of complex and blended threats, we have complied a few incidents and articles that further underscore a need for understanding such threats. Looking to 2018 retrospectively as we turn to yet another...
by Gate 15 | Nov 26, 2018 | Uncategorized
By Omar Tisza Cyber threats are increasingly gaining the full attention of industry and–most recently–government as the Department of Homeland Security establishes the newly announced Cybersecurity and Infrastructure Security Agency (CISA) to advance the state...