30 11, 2016

SF Muni Attack Latest to Show Critical Infrastructure Risk

By |2016-11-30T20:55:53-08:00November 30th, 2016|Categories: Articles|Tags: , , , , , , |

Image via Flickr user Michael Ocampo CC. SF Muni Attack Latest to Show Critical Infrastructure Risk The cyberattack on the San Francisco Municipal Transportation Agency is a much needed reminder that critical infrastructure, both large and small, remains a target and is susceptible to ransomware. IBM has named [...]

20 09, 2016

A Glimmer of Hope for Cyberthreat Data Sharing

By |2019-11-18T09:12:34-08:00September 20th, 2016|Categories: Articles|Tags: , , , , , , , , |

New Context’s partner, Soltra, was recently featured in an article on the value of cyber threat data sharing. “A new wrinkle offers hope. U.S. Bank and other institutions have begun using technology known as Soltra to generate machine-readable cyberthreat alerts that can automatically trigger actions in security software. This should [...]

31 08, 2016

Beyond Self-Driven Collisions: Real Risk Lies in Cyberthreats to Autonomous Systems

By |2016-10-24T19:43:23-07:00August 31st, 2016|Categories: Articles|Tags: , , , , , , |

Image via Pixabay.com As we march down the path of autonomous vehicles, both on the roads and in the air, collisions remain the dominant security issue of the news cycle. While we certainly want vehicles to avoid collisions whenever possible, we need to sound a much different alarm: [...]

22 06, 2016

Beyond the Cloud: When Industrial Data Centers Become Intelligent

By |2019-11-18T09:14:06-08:00June 22nd, 2016|Categories: Articles|Tags: , , , , |

There are certain inflection points, transitions, and cyclical patterns in technology. Mainframe to personal computer, desktop to mobile, mobile to wearables -- each pushing the center of computing back and forth, back and forth. With each of these inflections there are concurrent power shifts; IBM to Microsoft, Microsoft to Apple, [...]

11 06, 2015

DevOps orchestration could pose an enterprise risk

By |2019-11-18T09:18:48-08:00June 11th, 2015|Categories: DevSecOps|Tags: , , , , |

Orchestration tools are part of the lifeblood of any DevOps team and are picking up steam across all industries. DevOps methods are becoming the preferred software development technique. While this shift undoubtedly brings countless perks, it also provides a whole new set of concerns. With great power comes great responsibility. [...]

28 01, 2015

GHOST glibc Remote Code Execution Vulnerability

By |2019-11-18T09:19:13-08:00January 28th, 2015|Categories: Articles|Tags: , , , , , , |

Cyber Security Concept by noticias seguridad. Used with Creative Commons Rights. https://www.flickr.com/photos/127899393@N04/ A new critical Linux vulnerability has been announced and nicknamed GHOST.  The bug exists in glibc, the GNU C library and affects many Linux systems dating back to 2000. Attackers can use this flaw to remotely [...]

Go to Top