OnWire is a certified 8(a) and Women Owned Small Business (WOSB). As an IBM Business Partner, the company’s leadership in Identity and Access Management (IAM) security solutions provides products and services to assist customers in defining strategy, centralizing identity management and reducing the cost associated with user provisioning and access management. OnWire R&D strives to provide government and commercial sectors with solutions that support efficient management of the entire identity lifecycle.
Why keep Cybercom and the NSA’s dual-hat arrangement?
The dual-hat arrangement, where one person leads both the National Security Agency (NSA) and U.S. Cyber Command (Cybercom), has been in place since Cybercom’s creation in 2010. What was once touted as temporary 13 years ago now seems established. Will the dual-hat arrangement continue? Should it? Experts have discussed the…
Read MoreWhy consumer drones represent a special cybersecurity risk
Cybersecurity staff at an East Coast financial services company last summer detected unusual activity on its internal Atlassian Confluence page originating inside the company’s network. The MAC address used locally belonged to an employee known to be currently using the same MAC address remotely, according to a security specialist named…
Read MoreMachine learning operations can revolutionize cybersecurity
Machine learning operations (MLOps) refers to the practices and tools employed to streamline the deployment, management and monitoring of machine learning models in production environments. While MLOps is commonly associated with data science and machine learning workflows, its integration with cybersecurity brings new capabilities to detect and respond to threats…
Read MoreZero-day attacks are on the rise. Can patches keep up?
That latest cyberattack threatening your organization is likely coming from outside the corporate network. According to Mandiant’s M-Trends… Read More
Alert fatigue: A 911 cyber call center that never sleeps
Imagine running a 911 call center where the switchboard is constantly lit up with incoming calls. The initial… Read More
Cost of a data breach 2023: Financial industry impacts
According to the IBM Cost of a Data Breach Report 2023, the global average cost of a data… Read More
Can a private internet co-exist with the internet we know?
The security industry has always dreamed about an impenetrable internet where threats are neutralized and attackers cannot thrive.… Read More
Advanced analytics can help detect insider threats rapidly
While external cyber threats capture headlines, the rise of insider threats from within an organization is a growing… Read More
Juice jacking: Is it a real issue or media hype?
You get off a flight and realize your phone is almost out of battery, which will make getting… Read More