Viakoo Blog

Posts about

cyber

How Remediation Deficits Can Lead to Disaster

Cyber criminals and cybersecurity professionals have been at war for many years; battles are hard fought, damages have been significant, and there is no quick end to what is clearly a prolonged conflict. One advantage that cyber criminals have on their side is the accumulated remediation deficit that has built up within organizations. There are over 170,000 known vulnerabilities that are tracked by NIST in the national vulnerability database; 58% of them with either critical or high severity. Thankfully, many of them can be remediated using traditional IT cybersecurity solutions for password, patch, and certificate management. But what about those IoT systems where traditional solutions don’t apply? Roughly half of known vulnerabilities can be exploited on IoT devices. That’s where the stage is set for significant damage from cyber criminals from distributed and unmanaged IoT systems.

ThroughTek, Round 2:  Need for Automated Remediation

Today’s news I had to read twice – devices using a ThroughTek chipset contain a significant...

Are You Sisyphus or Proteus?

This week I came across two quotes that reinforced why keeping up with firmware patches is both...

Colonial Pipeline Cyberattack – Will This One Spur Action?

The ransomware attack and subsequent shutdown of the Colonial Pipeline system on the U.S. East...

Breaking the Cyber Kill Chain

Many cyber security professionals rely on process and methodology to ensure they are as effective...

What’s Your IoT Security Quadrant?

Knowing where you are positioned is a good starting point to take action to improve that position....

Why Urgency Around Unmanaged and IoT Security Hit This Week

In several corporate boardrooms (perhaps yours), this was the week where the risk and scale of...

Viakoo Comments on Solarwinds Breach

Summary Viakoo was not affected by the SolarWinds breach.  Viakoo does not share technologies nor...

Good Advice – Wash Your Cyber Hands!  Even Better – Do It Remotely!!

We are on the verge of a crisis in Cyber Hygiene.  Not only are millions of IoT devices (like...

Enterprises Sit on a Time Bomb

The Security Industry Association's Primer: Minimize Risk by Protecting Privacy is an important...
Prev 1 2 Next