Cybersecurity Blog

Featured Post

The Nation’s Critical Infrastructure Is Under Attack—but the “Next Generation of Zero Trust” Can Protect Against the Attackers.

The United States government is ramping up efforts to protect the nation’s critical infrastructure, providing guidance to both public and private sectors to strengthen their security and resilience over the next two years.


( read )

Tags: data breach, cybersecurity

ARIA and Rockwell Outline Breakthrough New Approach To Protecting Manufacturers From New Wave of Sophisticated Cyberattacks

ARIA and Rockwell detail how a global pharma giant is securing its production facilities using AZT PROTECT in new webinar


( read )

Tags: cyber attack, data breach, data protection

UnitedHealth Group’s Optum Subsidiary disrupted by Cyberattack putting critical patient needs at risk.

A major cyberattack has just hit the systems of a subsidiary of US health insurance giant, UnitedHealth. In an SEC filing,...


( read )

Tags: cyber attack, data breach, cybersecurity,

The SEC just got serious about cyber incident reporting – here’s why your CISO and board should be worried

New SEC rules demand full disclosure of material cybersecurity incidents 4 days after they happen – are your OT security tools...


( read )

Tags: cyber attack, data breach, cybersecurity,

Top 5 Reasons Companies Are Denied Cybersecurity Insurance

Cybersecurity insurance is an absolute necessity for any business operating in the modern world. However, increasing demand and...


( read )

Tags: cyber attack, data breach, cybersecurity,

A Closer Look at the Microsoft Exchange Server Cyberattacks

While past blogs focused on the initial cyberattack involving Microsoft Exchange Server, this follow-up article takes a much...


( read )

Tags: cyber attack, data breach, cybersecurity,

The Top 10 Most Significant Data Breaches Of 2020

Most everyone agrees that 2020 was a loss-leader of a year. 


( read )

Tags: cyber attack, data breach, cybersecurity,

Why ARIA Cybersecurity Won Two Awards for Best Cybersecurity Products?

As we’ve previously discussed, traditional threat detection tools and resources can’t reliably identify cyber attacks. This is...


( read )

Tags: cyber attack, data breach, cybersecurity

What is Encryption Key Management and KMS Implementation?
To provide effective data protection and application defense and remain in compliance, organizations today need to protect their...

( read )

Tags: data breach, cybersecurity, data protection