SolarWinds and SUNBURST: The Technical Risks of State-Sponsored Terrorism

solarwinds hack bug

The news cycle for anyone connected with cybersecurity has been dominated by information regarding the SolarWinds hack. This breach, starting with a single cloud and security provider, has now become a national emergency as more and more private institutions have become infected with potentially dangerous results.

As this situation unfolds, we wanted to touch base and provide background into the underlying methods and strategies used by the hackers. Following that, you can see how the attacks took place not just because of vulnerabilities in a system, but through an interconnected network of systems made vulnerable by one vendor. Finally, we provide some basic concepts to consider for your company’s security moving forward. 

Read More

What is Compliance Process Automation?

compliance process automation

Modern businesses are data-driven, and that fact has put compliance and data governance at the forefront of contemporary security and IT support. With so much information, much of it pertaining to private consumer issues like finances, health, and Personal Identifiable Information (PII), it’s imperative for businesses to comply with regulations that protect that data from theft or unlawful viewing. That’s why businesses are turning to compliance process automation to make auditing and reporting faster, more efficient, and more accurate. 

Read More

The Impact of Quantum Computing on Cybersecurity

quantum computing

In December 2020, Chinese researchers claimed to have developed the fastest quantum computer in the world. This computer, built using quantum particles and using light as a medium, can perform calculations exponentially faster than classical computers.

What is currently the bleeding edge of computing and scientific research tends to become the norm at some point, and as such security experts are watching these developments closely. Quantum computing could disrupt modern cybersecurity and its reliance on the limitations of traditional computing.

Read More