Viakoo Blog

Posts about

IoT

Breaking the Cyber Kill Chain

Many cyber security professionals rely on process and methodology to ensure they are as effective as possible in preventing cyber criminals from succeeding. In the same way, cyber criminals also take a methodological approach to achieving their objectives – what has been referred to as the “cyber kill chain”. Success in cyber security in part comes from understanding their approach and breaking it so it won’t succeed; something Viakoo takes an active role in.

What’s Your IoT Security Quadrant?

Knowing where you are positioned is a good starting point to take action to improve that position....

Why Urgency Around Unmanaged and IoT Security Hit This Week

In several corporate boardrooms (perhaps yours), this was the week where the risk and scale of...

Viakoo Comments on Solarwinds Breach

Summary Viakoo was not affected by the SolarWinds breach.  Viakoo does not share technologies nor...

IoT and Security: What CISOs Must Know

Ubiquitous in nature and expansive in scope, IoT is vulnerable on many levels In the ever-expanding...

IoT and Security: Foundational Knowledge for CISOs

Foundational knowledge in how CISOs must view corporate security is a major threat presented by IoT...

Good Advice – Wash Your Cyber Hands!  Even Better – Do It Remotely!!

We are on the verge of a crisis in Cyber Hygiene.  Not only are millions of IoT devices (like...

Enterprises Sit on a Time Bomb

The Security Industry Association's Primer: Minimize Risk by Protecting Privacy is an important...

How to Get Physical with Cybersecurity

Earlier this summer the Center for Cyber and Homeland Security (CCHS) at Auburn University in...

What is Your Mean Time to Innocence

If you’re responsible for physical security, then you might be familiar with the concept of “mean...
Prev 1 2 Next