by Gate 15 | Jul 30, 2020 | threats
In a blog post on 28 Jul, security researchers at Claroty (@Claroty) shared that they have “discovered remote code execution vulnerabilities affecting virtual private network (VPN) implementations primarily used to provide remote access to operational technology...
by Gate 15 | Jul 7, 2020 | Pandemic, podcast, threats
The people have spoken! The Gate 15 Pod has now become the Risk Roundtable. In this episode the gang is back at it as Dave, Jen, Jorhena, and Andy talk about extremism going mainstream, the continuously evolving threat of ransomware (double extortion, cartels, and...
by Gate 15 | Dec 29, 2019 | preparedness, threats
By Omar Tisza As 2019 turns into 2020, technologies and threats that impact daily operations and data security persist in blended and complex ways. The convergence of both physical and cyber domains increase the productivity and value of businesses and critical...
by Gate 15 | May 16, 2017 | Uncategorized
The National Terrorism Advisory System is an inadequate tool to communicate threats and risks to homeland security. From Friday, over the weekend, and continuing, organizations around the world, to include numerous entities within the critical infrastructure...
by Gate 15 | May 11, 2017 | Uncategorized
Vocabulary.com defines extortion as “forcing someone into giving you something through threats.” Most commonly the extortioner desires money but it could be anything deemed to be as something of value. The extortioner may desire a decision made in his/her favor or the...