Cyber Security – Part 1: An Introduction to Cyber Security

Cyber Security and SD-WAN

We live in an age where, unfortunately, it is essential for us all to be adequately protected from the various dangers we, and our devices and networks, may encounter online. In order to combat these cyber threats, the cyber security industry is working tirelessly to try and outpace those that may wish to do harm …

Read more

Cyber Security – Part 1: An Introduction to Cyber Security was last modified: July 16th, 2018 by Rick Spencer

5 Cyber Threats Currently Faced by the Financial Sector 

Cyber Security threats to the financial sector have grown and diversified over the years. A key critical infrastructure of our economy, financial services and banking sector are among the most lucrative targets for hackers looking to gain financially from their exploits. Financial institutions today are looking at cutting edge methods and tools to stay ahead …

Read more

5 Cyber Threats Currently Faced by the Financial Sector  was last modified: August 9th, 2019 by Rick Spencer

How Is Blockchain Transforming Future Landscape of Cyber Security

Blockchain cybersecurity

In today’s day and age, it is fairly likely that you’ll have heard of bitcoin, a relatively recently created digital cryptocurrency. However, it is a little less likely that you will have heard of blockchain technology, although, if this is the case, it will most likely not be that way for long. With the value …

Read more

How Is Blockchain Transforming Future Landscape of Cyber Security was last modified: March 6th, 2018 by Rick Spencer

Predicting and Managing the Threats Through Adaptive Cyber Security

adaptive cyber security

In an age where cyber security threats are an unfortunate everyday fact of life, cyber security systems are consistently being pushed to their limits by the new and evolving methods employed by hackers and others cyber threats. Organizations today are looking for solutions that enable them to predict, prepare and react proactively to the shifting …

Read more

Predicting and Managing the Threats Through Adaptive Cyber Security was last modified: August 27th, 2018 by Rick Spencer

5 Common Vulnerabilities in Industrial Control Systems

Industrial Control Systems Vulnerabilities

The use of Industrial Control Systems (ICS) stretches across a wide range of critical infrastructure sectors, including energy, manufacturing, transport, water and waste management. ICS traditionally were isolated systems to control and manage industrial assets, machinery and systems. However, that is changing as we enter the age of fourth industrial revolution or the Industry 4.0 …

Read more

5 Common Vulnerabilities in Industrial Control Systems was last modified: March 31st, 2020 by Rick Spencer

Ensuring IT/OT Network Security in Critical Infrastructure


NCA-4010

1U High Performance x86 Network Appliance for Enterprise Firewall, UTM and IPS.
 


FW-7525

Fanless Desktop x86 Network Platform for vCPE, SD-WAN and Network Edge
 


LEC-6032

SCADA / ICS Security PC with Intel Atom E3845 CPU and Advanced LAN Bypass

Ensuring IT/OT Network Security in Critical Infrastructure was last modified: December 17th, 2019 by LEI Technology

Need of proactive IT / OT Security Strategy in Healthcare

Operational Technology or OT security has taken the center stage in the discussion of protecting our critical infrastructures from cyber attacks. With the rise of smart-devices and the Internet of Things, every industry has become ever more connected and integrated. Network-based systems and tools have become ever more common among organizations due to their enhanced …

Read more

Need of proactive IT / OT Security Strategy in Healthcare was last modified: February 2nd, 2018 by Rick Spencer

Securing High-Tech Manufacturing From Cyber Attacks

In recent years, the number of industries that have evolved to the point that a large portion of their critical infrastructure are computer-based, networked systems has continued to increase rapidly, meaning more and more industrial systems are vulnerable to cyber attacks. Increased connectivity between systems brings the potential for a multitude of organizational, operational and …

Read more

Securing High-Tech Manufacturing From Cyber Attacks was last modified: February 2nd, 2018 by Rick Spencer

Delivering In-train Infotainment with Onboard Passenger Information System


LVC-2000

Fanless In-vehicle PC with MIL-STD-810G Certified Shock and Vibration Resistance

Delivering In-train Infotainment with Onboard Passenger Information System was last modified: January 16th, 2020 by LEI Technology

Securing Cash-In-Transit with Access Control, Remote Tracking and Video Monitoring


LVC-5770-7D

Intel® Ivy Bridge Dual Core i7-3517UE In-Vehicle Computer

Securing Cash-In-Transit with Access Control, Remote Tracking and Video Monitoring was last modified: January 14th, 2020 by LEI Technology