Cybersecurity
Anatomy of a Data Breach
What are They and What to do When You Spot One? Arguably no phrase has dominated the tech world the last 24 months more than the term “data breach.” From breaches that have impacted critical infrastructure like the Colonial Pipeline to hackers compromising healthcare records at UC San Diego Health, the last two years have…
Read MoreScaling at the Edge – Making Industrial IoT and Smart Buildings Cyber Safe
Making Industrial IoT and Smart Buildings Cyber Safe Veridify’s cybersecurity uses technology from Intel and industrial computing hardware from Advantech. Veridify and Advantech were invited by Intel to participate in Intel’s “Scaling at the Edge” video series. Watch Video (10 min) | View Slides Watch our more detailed webinar on the same topic.
Read MoreConcerned About Cybersecurity? 4 Easy Steps for Staying Secure
Cybersecurity has become one of the biggest hot topics both inside and outside of technology circles over the last two years. From securing learning devices due to a rise in digital learning during the COVID-19 pandemic, to coping with the fallout of high-profile breaches of national infrastructure such as the Colonial Pipeline, there is a…
Read MoreApplying Zero Trust to OT Networks For Smart Buildings
In December 2021, a ransomware attack locked a BAS firm and its building client out of the system, taking out 75% of smart building OT. Using device-level SaaS security in a NIST-compliant Zero Trust framework, BAS vendors can prevent smart building breaches. SaaS security for OT devices uses device-level identification and authentication, with no direct device access…
Read More