OnWire is a certified 8(a) and Women Owned Small Business (WOSB). As an IBM Business Partner, the company’s leadership in Identity and Access Management (IAM) security solutions provides products and services to assist customers in defining strategy, centralizing identity management and reducing the cost associated with user provisioning and access management. OnWire R&D strives to provide government and commercial sectors with solutions that support efficient management of the entire identity lifecycle.
X-Force 2022 Insights: An Expanding OT Threat Landscape
This post was written with contributions from Dave McMillen. So far 2022 has seen international cyber security agencies issuing multiple alerts about malicious Russian cyber operations and potential attacks on critical infrastructure, the discovery of two new OT-specific pieces of malware, Industroyer2 and InController/PipeDream, and the disclosure of many operational technology (OT) vulnerabilities.…
Read MorePrepare for Quantum Encryption Today
Once a cutting-edge sci-fi theory, quantum encryption – along with the computing power that drives it – may be close to wide-scale deployment. When it comes online, all previous cryptographic standards used to protect our data could go up in smoke. With every tool that could change the world comes…
Read MoreIncident Response for Health Care IT: Differences and Drivers
Threat actors continue to target the health care industry. IBM’s Threat Intelligence Index for 2022 rates the industry as the sixth most targeted. That puts it close behind the energy and retail and wholesale sectors. Certain regions seem to be more prone to attack as well. The Asia-Pacific region accounted…
Read MoreHow to Compromise a Modern-Day Network
An insidious issue has been slowly growing under the noses of IT admins and security professionals for the… Read More
Security Automation Can Save You $3.05M in a Data Breach
When it comes to reducing security breach costs, companies with security artificial intelligence (AI) and automation can save… Read More
Controlling the Source: Abusing Source Code Management Systems
For full details on this research, see the X-Force Red whitepaper “Controlling the Source: Abusing Source Code Management… Read More
9 Factors to Consider Before Choosing a UEM Solution
The more of your employees who work remotely some or all of the time, the more devices they’re… Read More
Everything CISOs Need to Know About NIST
It’s never been harder to be a chief information security officer (CISO). In 2021, there were 50% more… Read More
Fishy Business: What Are Spear Phishing, Whaling and Barrel Phishing?
For threat actors, phishing embodies the holy trinity of goals: easy, effective and profitable. It’s no wonder that… Read More