Viakoo Blog

Posts about

cyber

Breaking the Cyber Kill Chain

Many cyber security professionals rely on process and methodology to ensure they are as effective as possible in preventing cyber criminals from succeeding. In the same way, cyber criminals also take a methodological approach to achieving their objectives – what has been referred to as the “cyber kill chain”. Success in cyber security in part comes from understanding their approach and breaking it so it won’t succeed; something Viakoo takes an active role in.

What’s Your IoT Security Quadrant?

Knowing where you are positioned is a good starting point to take action to improve that position....

Why Urgency Around Unmanaged and IoT Security Hit This Week

In several corporate boardrooms (perhaps yours), this was the week where the risk and scale of...

Viakoo Comments on Solarwinds Breach

Summary Viakoo was not affected by the SolarWinds breach.  Viakoo does not share technologies nor...

Good Advice – Wash Your Cyber Hands!  Even Better – Do It Remotely!!

We are on the verge of a crisis in Cyber Hygiene.  Not only are millions of IoT devices (like...

Enterprises Sit on a Time Bomb

The Security Industry Association's Primer: Minimize Risk by Protecting Privacy is an important...

Edge Data Centers Drive Changes in Physical Security

According to a recent report from the research firm IDC entitled Data Age 2025, more than 33...

How to Get Physical with Cybersecurity

Earlier this summer the Center for Cyber and Homeland Security (CCHS) at Auburn University in...

The Need for Compliance as a Service for Physical Security

Physical security systems can be managed and operated in a variety of ways – some methods lead to...

Viakoo Solutions Harden and Support Cloud-Based Physical Security Services

Many organizations are implementing, or have already implemented, cloud-based physical security...
Prev 1 2 3 Next