Cyber threats have received a lot of attention lately (e.g. Target, Sony, etc.), and the general public is becoming more aware of the damage that can be inflicted by attacks targeted at digitally vulnerable systems. Although alarming to some, news of this threat isn’t new for operators of critical infrastructure, who have been protecting themselves against this type of attack for years. Even though general safeguards have been put in place, there is a lot of variation between different critical infrastructure organizations in how well they have prepared for the looming threat of cyber-attacks.read more
The energy sector is set to face five of the biggest challenges in cyber security this year. With high costs at stake these companies are vulnerable to security threats, like critical infrastructure attacks, data destruction, breaches, insider threats and much more. It is time for the energy sector to proactively address these threats that are targeting their most valuable assets before it is too late.read more
In 2010, the Hawaii State Archives introduced the Digital Archives Project, an agency whose primary goal is to collect and permanently store state government records that would possess historical, legal and fiscal value. Protecting each record from loss, alteration, deterioration and technological obsolescence while maintaining them in a trustworthy state is their primary responsibility. The Hawaii State Digital Archives needed a solution that could provide them with a high assurance that files submitted were free from malware and that it could identify and analyze the mass amount of file types being transferred.read more
I think this development was inevitable, but that doesn't make it any less disturbing. Potentially unwanted applications (PUAs) are now borrowing techniques from malware developers.read more
February was a big month for OPSWAT. Read on for tips on avoiding data breaches, dates for our upcoming webinars and a summary of our product updates this month.
If you want to sign-up to receive our monthly newsletters, please visit our preferences page. You can also interact with us on social media by following us on Twitter: @OPSWAT or by visiting our LinkedIn company page!read more
Integrating a new member is something every team has to go through every now and then, so I figured that we could all use a little refresher on making the “newbie" feel welcome and setting them up for success. You might not have been a new hire for quite some time, so here are a few suggestions to help create a smooth transition for both you and your new team member.read more
Edvation is an e-learning company that focuses on improving ways students learn. They provide a virtual classroom setting so that teachers and students have the ability to communicate easily, while sharing projects, educational documents and course-related articles. With files constantly being uploaded and downloaded by students and teachers, Edvation became concerned that there was a chance of a malicious file being uploaded to their system. The goal was to find a cost-effective solution that could help them maintain a secure platform for all users.read more
"External network links are the lifeblood of most malware," said information security journalist Darren Pauli, in a recent article featured on The Register. In this article, Darren discusses a clever piece of malware that was sent to researchers at FireEye for investigation after it was found on an air gapped network.read more
If you pay attention to Amazon Web Services (AWS), you may have seen an announcement about a year ago that hosting would soon be available in China (Beijing). And if you’ve looked into it, you no doubt noticed that it’s not truly part of AWS – it’s actually a separate company (a joint venture) and requires a separate account. While many of the services are the same, they lack much of the seamless integration with the broader AWS ecosphere.read more
Another month and another GEARS release with exciting new features.
In case you missed last month’s release notes, GEARS now publicizes our release code names. Last month was Minnesota; this month is Iowa. Interesting fact: Iowa is the only US state bordered by two navigable rivers.read more