Kiosk & USB Security

Insights on the Secure Implementation of Network Segmentation Control Systems 

Protecting Critical Networks: Power Grid

December 07, 2018 by Yiyi Miao
A recent article talks about the continued targeting of the U.S. power grid by Russia-linked hacking groups, specifically by “TEMP.Isotope.” While the U.S. critical infrastructure continues to improve its cyber defenses, some of the...

Protecting Critical Networks: Maritime Industry

December 07, 2018 by Yiyi Miao
A recent article describes the alarming cyber security issues faced by today’s maritime industry. It is entirely feasible for a hacker to break into a ship’s computer system and alter the ship’s course, for example. The primary...

NERC CIP and Transient Cyber Asset Protection

December 07, 2018 by Frank Dye
In today’s world it is essential for all organizations to have strong cyber security policies, and especially for those that are considered a part of the critical infrastructure. Critical infrastructure organizations, including energy...

Event Wrap Up: OPSWAT DAY 2018 in Japan

November 08, 2018 by Hiroshi Sekiya
On October 24, 2018, OPSWAT Japan Co., Ltd., a leading provider of Data Sanitization (CDR) and Multi-Scanning technologies, hosted a seminar co-sponsored by Net One Partners Co., Ltd., OPSWAT’s primary distributor in Japan. The...

Electric Power on the Strip: GridSecCon 2018 Wrap-Up

October 29, 2018
GridSecCon 2018 brought together over 600 cyber security professionals in the electric industry in sunny Las Vegas, Nevada to discuss the latest security trends, best practices, and lessons learned in securing the electric power...

Best Practices for Media Security Kiosks

September 04, 2018 by Yiyi Miao
A media security station or media security kiosk is the entry point for data and files going into an air-gapped or isolated network. An air gap is an extremely good protection mechanism, which...

Infographic: Secure Data Workflow - Defending the Castle

August 27, 2018 by Yiyi Miao
When dealing with highly secure networks one of the best ways to defend against threats is to isolate the network to minimize your attack surface. This isolation can come in several different forms, with an air-gapped network being...

Sign up for Blog updates

Get information and insight from the leaders in advanced threat prevention.