The growing threat of drones

Sorry, this post has not been published yet, check again later!

July 24, 2019
Published by:

ICS Cybersecurity Conference

“Like any smart device,” comments Chris Morales, head of security analytics at Vectra, “the manufacturer needs to provide a method for the owner to update the software for security patches as well as ensure they have strong device password authentication. Lastly, the device should use a form of remote encrypted communication that is reasonably strong and resistant from man in the middle attacks and device hijacking.”

Read publication

Most recent media coverage

Right place, right time: machine learning in cyber incident response

October 19, 2021

TEISS

Read more

30 Mins or Less: Rapid Attacks Extort Orgs Without Ransomware

October 13, 2021

Threatpost

Read more

Ransom Disclosure Act Would Require Victims to Disclose Ransom Payments Within 48 Hours

October 7, 2021

SECURITY Magazine

Read more