Technical Support: 412-349-6678 | Incident Response

About: CharlesKime

Zero Trust Framework - microsegmentation

Is It Time for Zero Trust Over VPN?

Unlike many holiday seasons, attackers continued an onslaught on US organizations between Christmas and the new year. While many of the attacks continue to catch headlines as ransomware, a deeper look suggests that it may finally be time for all organizations to move beyond perimeter defense. The Ransomware Invasion Ransomware...
What to expect from FBI warning about Iran cyberattacks

What To Expect From FBI Warning About Iran Cyberattacks

At the end of last year, we covered the Iranian hacker group, APT33, and warned it was scouting U.S. targets for attack. However, since then, a top Iran general was killed during a recent U.S. military strike in Iraq. In response, Iran threatened retaliation. Thus, the FBI issued an alert...
Internet of Things Devices

Exploring the Internet of Things

Lately, when Internet of Things (IoT) security shows up in the news, warnings about overly connected Christmas toys or the hacking of an unfortunate consumer’s NEST home system make the headlines. These stories are based on the consumer level. However, the IoT can be just as prevalent, and much more...
Cybersecurity - 7 tips for how to improve

The Vulnerability is the Target

Data Breaches and CybersecuritySometimes clients know why they might be targets. Banks, for example, have been targets long before they went digital.  However, many small companies wonder why would they be a target for hackers. In an interview with Sue Marquette Poremba of IT Business Edge, James Strickland, CEO of Veridium, gives...