IoT Security

Key Considerations for Choosing the Right ZTNA Solution for Your Business 

When it comes to achieving zero trust network access (ZTNA), there are many different architectures to choose from for your business’s solution. Today, we’ll discuss several in more detail to help you make the most informed choice possible.
July 25, 2023
Read More

Turn Your Old Smartphone into a Secure Live IP Streaming Camera With CloudConnexa®

Do you have an old smartphone lying around? Don't recycle it or trade it in for a new one for a paltry sum! You can turn it into an Internet Protocol streaming security camera (IP camera) and view the live video stream from anywhere for free. You may get more value from repurposing your smartphone as a security camera than the trade-in value of your old phone. This blog post provides a step-by-step guide to upcycling your old phone.
May 2, 2023
Read More

Forget IT Security: Why OT Systems Could Be Your Biggest Cyber Risk

Operational Technology systems run the world. It’s time we address the expanded attack surface and security risks that come with them.
July 14, 2022
Read More

Cybersecurity for the Manufacturing Industry

The manufacturing industry's embrace of the Internet of Things (IoT) has changed our world in countless ways — not the least of which is that it resulted in Industry 4.0.
March 10, 2022
Read More

IDS/IPS: What They Are, and Why You Need Them

Intrusion Detection Systems and Intrusion Prevention Systems — or IDS/IPS — are invaluable, readily available network security tools for mitigating malicious traffic and suspicious activity. And the benefits of IDS/IPS aren’t limited to vulnerabilities associated with 5G. Read on for a look at how your business can make an Intrusion Detection System and Intrusion Prevention System part of your security management.
February 22, 2022
Read More

IoT Vulnerabilities for Cybersecurity

IoT devices such as cameras and virtual assistants don't just house sensitive data; they're a way for bad actors to actually look into your home.
January 6, 2022
Read More

Google's SLSA Looks Good, But Is It Enough?

ast month, Google introduced “Supply chain Levels for Software Artifacts” (SLSA), an end-to-end framework to ensure the integrity of software artifacts throughout the software supply chain. It's a powerful first step -- but is it enough?
July 15, 2021
Read More

IoT Risks Are Growing: Is Your Business Prepared?

The Internet of Things is ever-expanding, which means the risk to your business network is expanding, too. Here's what you can do about it.
May 20, 2021
Read More

Learning from the Colonial Pipeline Hack: 4 Ways to Mitigate the Risk of a Ransomware Attack

The cyberattack that knocked an essential U.S. gasoline pipeline offline shows how dangerous the professional-scale hack-for-ransom threat is, and it's spreading rapidly.
May 13, 2021
Read More

CNI Under Attack: What Can We Learn From the Florida Water Hack?

When the worst case scenario nearly played out in Oldsmar, Florida earlier this month, the cybersecurity community was perhaps less surprised than the public and mainstream media.
March 4, 2021
Read More