Posts

Showing posts from July 19, 2019

Picture This: Double Take: The White House or Not?

Image
Double Take: The White House or Not? By Kristi Finefield In this latest entry in Double Take , the blog series where we take a closer look at images in our collections, we will talk about the photo below and how an assumption led to an interesting research journey. What do you see when you look at this photo? What building is behind this couple? Mirza Ali Kuli Khan & wife. Photo by Bain News Service, 1913 May 28. Most of you probably said the White House in Washington, D.C. I would definitely agree that, at first glance, the building has all the hallmarks of the Executive Mansion – it's white, it has a curved portico, the scale looks about right. Even the context seems on point, with these very elegantly dressed guests in the foreground. However, an important tenet to keep in mind when studying photograp...

Daily Deal - 911 Operator, 80% Off

Image
Today's Deal: Save 80% on 911 Operator !* Look for the deals each day on the front page of Steam. Or follow us on twitter or Facebook for instant notifications wherever you are! *Offer ends Thursday at 10AM Pacific Time via Steam RSS News Feed "https://ift.tt/2GffJr1"

Daily Deal - No More Robots Publisher Sale, up to 35% off

Image
Today's Deal: Save up to 35% during the No More Robots Publisher Sale !* Look for the deals each day on the front page of Steam. Or follow us on twitter or Facebook for instant notifications wherever you are! *Offer ends Sunday at 10AM Pacific Time via Steam RSS News Feed "https://ift.tt/2Z0oVqz"

Cybersecurity: Drones Will Soon Become Both Predator and Prey

Image
In the coming years, commercial drones will become a predator controlled by attackers to conduct targeted assaults on business. Drones will become smaller, more autonomous with increased range and equipped with cameras for prolonged surveillance missions. Flying in close proximity to operating environments, they will also be used to conduct advanced man-in-the-middle attacks, degrade mobile networks or spoof and jam other signals. Conversely, drones will become prey as they are targeted by attackers in order to disrupt dependent businesses. Drones will be knocked out of the sky and hijacked. Information collected by drones will be stolen or manipulated in real time. Industries that leverage drones to become more efficient, such as construction, agriculture and border control, will see their drones targeted as attacke...

The Automotive Industry: Stepping up on Defense

Image
We are midway through 2019, and automotive hacks continue to rise. The global market for connected cars is expected to grow by 270% by 2022, with more than 125 million passenger cars with embedded connectivity forecast to ship worldwide by 2022. The amount and quality of data is only destined to grow as manufacturers add more technology into the driver and the passenger experience, especially as we approach a time when cars will be capable of autonomously taking passengers from point A to point B. Cyberattacks on automotive players were not very common until recently, likely due to the fact that not too long ago, there was simply nothing to hack in an automobile. In recent years our dashboards have grown from basic entertainment systems to computers. As the incentive for hackers is growing we should assume as a...

Beyond the Endpoint: Fighting Advanced Threats with Network Traffic Analytics

Image
Safeguarding enterprise assets is no longer just about protecting endpoints from malware, spam and phishing. Enterprise infrastructures are much more complex today than even a few years ago. In a bid to optimize processes and maximize profits, businesses are deploying cloud services, IoT and mobile solutions at an unprecedented rate. Keeping pace with digital demands can result in an expanded attack surface. This means cybersecurity chiefs need an approach that ensures enterprises are protected from both external and internal threats. The effectiveness of an organization's incident response capabilities poses a major challenge in the face of a constantly expanding threat landscape riddled with sophisticated attackers. Business leaders are aware of the risks associated with an attack on their IT infrastructure, an...

Cybersecurity: Drones Will Soon Become Both Predator and Prey

Image
In the coming years, commercial drones will become a predator controlled by attackers to conduct targeted assaults on business. Drones will become smaller, more autonomous with increased range and equipped with cameras for prolonged surveillance missions. Flying in close proximity to operating environments, they will also be used to conduct advanced man-in-the-middle attacks, degrade mobile networks or spoof and jam other signals. Conversely, drones will become prey as they are targeted by attackers in order to disrupt dependent businesses. Drones will be knocked out of the sky and hijacked. Information collected by drones will be stolen or manipulated in real time. Industries that leverage drones to become more efficient, such as construction, agriculture and border control, will see their drones targeted as attackers’ spoof and disrupt transmissions. Technological breakthroughs in drone technologies, combined with developments in 5G, big data, the Internet of Things (IoT), and th...

The Automotive Industry: Stepping up on Defense

Image
We are midway through 2019, and automotive hacks continue to rise. The global market for connected cars is expected to grow by 270% by 2022, with more than 125 million passenger cars with embedded connectivity forecast to ship worldwide by 2022. The amount and quality of data is only destined to grow as manufacturers add more technology into the driver and the passenger experience, especially as we approach a time when cars will be capable of autonomously taking passengers from point A to point B. Cyberattacks on automotive players were not very common until recently, likely due to the fact that not too long ago, there was simply nothing to hack in an automobile. In recent years our dashboards have grown from basic entertainment systems to computers. As the incentive for hackers is growing we should assume as are the efforts to breach the data in automobiles. There has been astounding progress with car technology in recent years, particularly in the connectivity channels, WiFi, GPS...

Beyond the Endpoint: Fighting Advanced Threats with Network Traffic Analytics

Image
Safeguarding enterprise assets is no longer just about protecting endpoints from malware, spam and phishing. Enterprise infrastructures are much more complex today than even a few years ago. In a bid to optimize processes and maximize profits, businesses are deploying cloud services, IoT and mobile solutions at an unprecedented rate. Keeping pace with digital demands can result in an expanded attack surface. This means cybersecurity chiefs need an approach that ensures enterprises are protected from both external and internal threats. The effectiveness of an organization’s incident response capabilities poses a major challenge in the face of a constantly expanding threat landscape riddled with sophisticated attackers. Business leaders are aware of the risks associated with an attack on their IT infrastructure, and they know a breach is imminent if their security posture is weak.Additionally, the rising costs of downtime, incident response and recovery have revealed a worrying fact: ...