Contact Us
Menu
Contact Us
banner-hero

NetRise News & Blog

by NetRise, on May 31, 2022 9:51:33 AM

Risk management is a big part of running a business these days, especially in IT circles. Not only are threat actors always evolving and enhancing their attacks, but also the attack surface of organizations is constantly growing. The advent of IoT introduced literally millions if not billions of new devices for hackers to potentially exploit. Have you considered who really owns the risk associated with xIoT devices? Imagine it’s 2014 and your router was compromised …

Read Story

by Steve Struthers, on Apr 5, 2022 1:38:34 PM

In the world of xIoT security, we have learned some unfortunate and difficult lessons over the past decade. Events like Mirai, Shellshock, Heartbleed and Log4J have left so many of us with the question … “What’s next? And will it affect me?” Just as importantly, “will it be more or less destructive than what has come before?” The reality we are facing now is that 2021 was a year of significant growth of incidents within …

Read Story

by Jason Dely, on Mar 22, 2022 10:51:25 AM

Many companies have benefited greatly from rapid IT infrastructure changes to enhance a their overall capabilities and operational efficiency. By their very nature, companies operating Industrial Control Systems (ICS) - commonly considered Operational Technology (OT) - strive to derive value and tangible returns from investments made to support their company operations and to facilitate ongoing growth. Demands to perform and produce have never been greater, and today’s hyperconnected world serves to elevate the importance for …

Read Story

by Derek McCarthy, on Jan 18, 2022 2:11:06 PM

A famous philosopher once asked, “if a black box is opened in a forest, and no one is around to look inside, does it have vulnerabilities?” . . . On second thought, maybe that wasn’t the exact quote, but it captures the mystique that has surrounded eXtended IoT (xIoT) devices since, well, really the very beginning. Think about it: how many security solutions and technologies do we dedicate to our traditional workstations and servers? Endpoint …

Read Story

Subscribe to Newsletter