PinnedPublished inJulie SecurityUnderstanding The Real Costs For Your BusinessToday, cybersecurity protocols are more important than ever. But how much should you spend and where?Sep 13, 2021Sep 13, 2021
Published inJulie SecurityAddressing The Log4j VulnerabilityThe Log4j exploit is the latest major cybersecurity breach. But what is it? And why is it (literally) breaking the internet?Dec 30, 2021Dec 30, 2021
Published inJulie SecuritySector-Specific Cybersecurity For Critical InfrastructureAs cyberattacks mature in scale and damage, protecting critical infrastructure grows more in importance every single day. Specifics are key…Dec 23, 2021Dec 23, 2021
Published inJulie SecurityUnderstanding Your Risk ProfileWith cyber-attacks making headlines every day, many attempt to protect their network from every threat out there. But unfocused…Nov 17, 2021Nov 17, 2021
Published inJulie SecurityCybersecurity & SCADA Systems — Why It MattersSCADA systems are the heart of most modern industrial facilities. We’re going to discuss what SCADA is and why cybersecurity for this…Oct 12, 2021Oct 12, 2021
Published inJulie Security5 Common Cybersecurity Threats You Should Be Aware OfIn today’s digital world, there are countless cybersecurity threats hiding in plain sight. Many of them are more common than you may think…Sep 24, 2021Sep 24, 2021
Published inJulie SecurityOT/IT Convergence: Combining Systems For Business GrowthWith industry 4.0 in full swing, OT and IT are rapidly becoming one and the same. OT/IT convergence is driving a major digital…Sep 15, 2021Sep 15, 2021