Armor Resources

Curated content from Armor

 

The Good, Bad & Ugly of IoT Security

Through smart integrations of electronics, sensors and connectivity, the internet of things (IoT) has enabled us to automate an increasing number of day-to-day tasks. On the flip side, it’s also bringing in new threats.

Healthcare Startups: The Need for Advanced Security

The winds of change in the healthcare industry are blowing more forcefully than ever with the onslaught of various technological advancements like social media, big data, IoT, wearables, artificial intelligence, sensors and many others.

Security vs. Compliance: A Love-Hate Relationship

Ever since men started crafting laws, there has been a constant conflict on how people carry out the ‘letter of the law’ such that it also achieves the ‘spirit of the law.’ The essence of this conflict is now causing problems in regulated industries and regions where....

Spectre: Mitigations for Long-Term Risk

Even as updates start to trickle out, Spectre remains poised to haunt the IT industry for some time. First made public alongside the Meltdown vulnerability, Spectre is actually a class of vulnerabilities that take advantage....

The Power of Community: Threat Intelligence at the Speed of Cloud

There is increasing awareness that threat intelligence is a vital part of security. But having knowledge and leveraging it to protect your environment effectively is not the same thing. If only it were as simple as buying a list of IP addresses and domain names to blacklist.

Cloud & Cybersecurity #ArmorU Report: Our Findings & Their Implications

It’s no secret that the cloud provides a range of business benefits: agility, scalability and cost savings. But while there’s a lot of excitement about the cloud, there isn’t much data about whether organizations are actually....

The Forgotten Cybersecurity Threat: Insider Misuse

An old proverb states, “the road to hell is paved with good intentions.” We’re willing to bet this proverb wasn’t referring to cybersecurity when it originally came to be. When you think about it, though, it’s highly applicable to one of the biggest threats facing businesses today....

Logging & Security: Solving the Analysis Challenge

Logging is vital to any cybersecurity program. Combined with proper monitoring, logs can provide valuable information to security professionals that then enable them to detect malware activities, hacking attempts, configuration problems and other similar issues.

Meltdown: How to Protect Your Company

Every once in a while, there are days those of us in IT know will require extra cups of coffee to get through. The past few days have been among them, as revelations about critical vulnerabilities in microprocessors from Intel, ARM and AMD....

S.O.S. – Why Shiny Object Syndrome Is the Enemy of Security, Part 1

There are many descriptions for S.O.S. out there, but the following may be the most concise I’ve seen “Shiny Object Syndrome (Objectivius Shinium Syndromus) is defined as the attraction to objects that exhibit a glassy, polished, gleaming or otherwise shiny appearance.”

Who’s Haunting Your Network?

Disappearing files, phantom administrators, suspect logs. Unless you’re the suspicious type, you might have written these off as non-critical issues without any nefarious source. But what if there’s a maliciousness behind this madness? What if there are ghosts in your business machines? 

Worried about your cybersecurity risks?
WhiteHawk is ready to help.