OnWire is a certified 8(a) and Women Owned Small Business (WOSB). As an IBM Business Partner, the company’s leadership in Identity and Access Management (IAM) security solutions provides products and services to assist customers in defining strategy, centralizing identity management and reducing the cost associated with user provisioning and access management. OnWire R&D strives to provide government and commercial sectors with solutions that support efficient management of the entire identity lifecycle.
Unveiling the latest banking trojan threats in LATAM
This post was made possible through the research contributions of Amir Gendler. In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on…
Read MoreCrisis communication: What NOT to do
Read the 1st blog in this series, Cybersecurity crisis communication: What to do When an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even…
Read MoreCybersecurity crisis communication: What to do
Cybersecurity experts tell organizations that the question is not if they will become the target of a cyberattack but when. Often, the focus of response preparedness is on the technical aspects — how to stop the breach from continuing, recovering data and getting the business back online. While these tasks…
Read MoreBrands are changing cybersecurity strategies due to AI threats
Over the past 18 months, AI has changed how we do many things in our work and professional… Read More
39% of MSPs report major setbacks when adapting to advanced security technologies
SOPHOS, a leading global provider of managed security solutions, has recently released its annual MSP Perspectives report for… Read More
Digital solidarity vs. digital sovereignty: Which side are you on?
The landscape of international cyber policy continues to evolve rapidly, reflecting the dynamic nature of technology and global… Read More
A decade of global cyberattacks, and where they left us
The cyberattack landscape has seen monumental shifts and enormous growth in the past decade or so. I spoke… Read More
Does your business have an AI blind spot? Navigating the risks of shadow AI
With AI now an integral part of business operations, shadow AI has become the next frontier in information… Read More
It all adds up: Pretexting in executive compromise
Executives hold the keys to the corporate kingdom. If attackers can gain the trust of executives using layered… Read More