Cross-Domain Solutions

NERC CIP and Transient Cyber Asset Protection

December 08, 2018 by Frank Dye
In today’s world it is essential for all organizations to have strong cyber security policies, and especially for those that are considered a part of the...

Event Wrap Up: OPSWAT DAY 2018 in Japan

November 08, 2018 by Hiroshi Sekiya
On October 24, 2018, OPSWAT Japan Co., Ltd., a leading provider of Data Sanitization (CDR) and Multi-Scanning technologies, hosted a seminar co-sponsored by...

Electric Power on the Strip: GridSecCon 2018 Wrap-Up

October 30, 2018
GridSecCon 2018 brought together over 600 cyber security professionals in the electric industry in sunny Las Vegas, Nevada to discuss the latest security...

Best Practices for Media Security Kiosks

September 04, 2018 by Yiyi Miao
A media security station or media security kiosk is the entry point for data and files going into an air-gapped or isolated network. An air gap is an extremely...

Infographic: Secure Data Workflow - Defending the Castle

August 28, 2018 by Yiyi Miao
When dealing with highly secure networks one of the best ways to defend against threats is to isolate the network to minimize your attack surface. This...

What Does 'Sheep Dip' Mean in Cyber Security?

February 16, 2018
Several UK-based vendors and experts recommend "sheep-dipping" removable storage devices – USB drives, hard drives, memory cards, etc. – in order to prevent...

6 Potential Security Gaps in File Transfer Process for Critical Infrastructure

January 29, 2018 by Yiyi Miao
In September 2017, Wired reported that hackers had gained access to multiple electrical power facilities in the U.S. Conceivably, the hackers could have shut...

For more information, please contact one of our cybersecurity experts.

Sign up for Blog updates!
Get information and insight from the leader in advanced threat prevention.