OnWire is a certified 8(a) and Women Owned Small Business (WOSB). As an IBM Business Partner, the company’s leadership in Identity and Access Management (IAM) security solutions provides products and services to assist customers in defining strategy, centralizing identity management and reducing the cost associated with user provisioning and access management. OnWire R&D strives to provide government and commercial sectors with solutions that support efficient management of the entire identity lifecycle.
Why Zero Trust Works When Everything Else Doesn’t
The zero trust security model is proving to be one of the most effective cybersecurity approaches ever conceived. Zero trust — also called zero trust architecture (ZTA), zero trust network architecture (ZTNA) and perimeter-less security — takes a “default deny” security posture. All people and devices must prove explicit permission…
Read More5 Golden Rules of Threat Hunting
When a breach is uncovered, the operational cadence includes threat detection, quarantine and termination. While all stages can occur within the first hour of discovery, in some cases, that’s already too late. Security operations center (SOC) teams monitor and hunt new threats continuously. To ward off the most advanced threats,…
Read MoreThird-Party App Stores Could Be a Red Flag for iOS Security
Even Apple can’t escape change forever. The famously restrictive company will allow third-party app stores for iOS devices, along with allowing users to “sideload” software directly. Spurring the move is the European Union’s (EU) Digital Markets Act (DMA), which looks to ensure open markets by reducing the ability of digital…
Read MoreKronos Malware Reemerges with Increased Functionality
The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code… Read More
Too Much Caffeine? Phishing-as-a-Service Makes Us Jittery
Recently, investigators at Mandiant discovered a new software platform with an intuitive interface. The service has tools to… Read More
Log4j Forever Changed What (Some) Cyber Pros Think About OSS
In late 2021, the Apache Software Foundation disclosed a vulnerability that set off a panic across the global… Read More
Dissecting and Exploiting TCP/IP RCE Vulnerability “EvilESP”
September’s Patch Tuesday unveiled a critical remote vulnerability in tcpip.sys, CVE-2022-34718. The advisory from Microsoft reads: “An unauthenticated… Read More
How Much is the U.S. Investing in Cyber (And is it Enough)?
It’s no secret that cyberattacks in the U.S. are increasing in frequency and sophistication. Since cyber crime impacts… Read More
Synthetic Media Creates New Social Engineering Threats
Social engineering attacks have challenged cybersecurity for years. No matter how strong your digital security, authorized human users… Read More