IoT Security

Will Cellebrite-Corellium Deal Reshape Digital Forensics?
Endpoint & Device Security Will Cellebrite-Corellium Deal Reshape Digital Forensics?

In an industry marked by rapid evolution and heightened complexity, the acquisition of Corellium by Cellebrite presents a potent force capable of revolutionizing digital forensics. This strategic move involves a transaction worth $170 million, enhanced by a $30 million performance-linked bonus,

June 2025 Patch Tuesday Reveals Critical ICS Vulnerabilities
Endpoint & Device Security June 2025 Patch Tuesday Reveals Critical ICS Vulnerabilities

In today's digital age, cybersecurity plays an increasingly crucial role in safeguarding industrial systems from emerging threats. Our expert, Rupert Marais, is a noted authority on endpoint and device security. He sheds light on the current landscape and the steps companies like Siemens, Schneider

Global Security Camera Vulnerabilities Spark Cybersecurity Alerts
Endpoint & Device Security Global Security Camera Vulnerabilities Spark Cybersecurity Alerts

In the realm of cybersecurity, working diligently behind the scenes are experts like Rupert Marais, whose authority in endpoint and device security, cybersecurity strategies, and network management has helped illuminate the dangers of around 40,000 exposed security cameras. As breaches and

Enhancing CI/CD Security with Wazuh: A Comprehensive Approach
Endpoint & Device Security Enhancing CI/CD Security with Wazuh: A Comprehensive Approach

Rupert Marais is a renowned expert in cybersecurity, specializing in endpoint and device security, as well as network management. His insights on securing CI/CD workflows come at a critical time when these processes are increasingly automated and complex. In this interview, Rupert shares his

AI Hallucinations and Bias – A Review
Endpoint & Device Security AI Hallucinations and Bias – A Review

In the ever-evolving landscape of technological progress, Artificial Intelligence (AI) stands as a transformative force, creating ripples across industries with its unparalleled ability to interpret data and aid decision-making. At the heart of the discourse surrounding AI are the questions of its

How Vulnerable Are Our Water Systems to Cyber Attacks?
Endpoint & Device Security How Vulnerable Are Our Water Systems to Cyber Attacks?

Recent revelations have exposed stark vulnerabilities within the U.S. water systems, prompting an urgent call for enhanced cybersecurity. A distressing investigation by security researchers unveiled numerous Human-Machine Interfaces (HMIs) misconfigured, recklessly open to internet access without

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later