Blog

Looking into BugZ’s Crystal Ball: What the Industry’s First Coleopteran Chief Vulnerability Officer Predicts for 2019

Let’s not beat around the bug – 2018 was not a good year for my kind. As of now, nearly one in three computers was hit with a malware attack this year, and ransomware attacks were up 43% over 2017, with nothing to signal that these trends will decrease any time soon.

Read More

Connectivity & Complex Supply Chains: Vulnerabilities of U.S. Weapon Systems

Bucking the trend of a cybersecurity blog beginning with bad news, we’re beginning this post with some positive news: the hunt for solutions to weapon systems vulnerabilities is finally underway. This thanks to The MITRE report, the GAO report, and Secretary Mattis’ recent launch of the Protecting Critical Technology Task Force, which fully articulate the vulnerabilities in legacy DoD weapon systems.

Read More

Endpoints Don’t Have to be the Weak Cybersecurity Link!

What you are about to read could be straight out of a horror movie. You would hear the eerie voiceover intoning…”In a world where endpoints are under constant attack, how do you protect yourself? Your critical infrastructure? Your data? Your business?”

Read More

Data centers must look past perimeter security

While data centers have traditionally relied on detection and perimeter security solutions to reduce risk, the proliferation of new types of cyber threats has elevated the need for prevention.

Read More
cyber-newtonian wormhole

Chronicles of the Cyber-Newtonian Wormhole: A Cautionary Tale of an Exploited Vulnerability

Finding a vulnerability and then developing and launching an exploit is repeated many times every day. Companies must be aware of two perspectives: what a system is intended to do, and what a system can do.

Read More

Emboldened Hackers & Vicious Malware: The Result of Our Failure to Learn From the Past

On an almost weekly basis, another organization or government agency owns up to having been “hacked” – admitting that its systems have been breached. For every company that discloses an issue, there are likely 20 – 30 more that keep it under wraps.

Read More

The State of Auto Cybersecurity: Connected Vehicles Have Hackers Accelerating Attacks

As the automotive industry adds more software and connections into vehicles, it simultaneously increases the probability of cyberattacks due to vulnerabilities.

Read More

What Cyberhardening Technology & the Star War’s Galactic Empire Have in Common

One of the main reasons cyber risk continues to increase exponentially is due to the rapid expansion of attack surfaces – the places where software programs are vulnerable to attack or probe by an adversary.

Read More

Industrial IoT’s Kryptonite: Looming Threats Poised to Disrupt Critical Infrastructure

Today’s industrial infrastructure is stronger and smarter than ever before. As manufacturers seek greater scalability and efficiency, they’ve automated and digitized their machines to achieve unprecedented power.

Read More

Supply Chain Cyberattacks Surging – How Can We Prevent Them?

Symantec’s new “Internet Security Threat Report,” shows a 200% increase in reported supply chain cyberattacks year on year.

Read More