Why Mid-Sized Organizations Need Enterprise-Level Cybersecurity


They may not hit the headlines, but that doesn’t mean that cyberattacks on small and mid-sized businesses aren’t devastating. In fact, without the security resources of their larger counterparts, cyberattacks can be even more financially and reputationally crippling for SMBs. Almost half of all cyberattacks are now targeting SMBs, particularly those in the legal, insurance, […]

Bridging the Cyber Skills Gap for Small Businesses


The past few years have brought about some major changes in the way small businesses work. The rapid shift to remote or hybrid work, and subsequent adoption of cloud applications, has expanded small businesses’ threat landscape. Almost half (43%) of all data breaches now target SMBs (small and midsize businesses), with hackers looking to exploit their […]

Nation-State Threats to Power and Other Utilities


A cyberattack on a power company can have catastrophic consequences. One malicious email, infected assets, or a compromised supply chain partner can lead to loss of power across entire regions. While it’s acknowledged that their distributed infrastructure, increased digitalization, and reliance on supply chain partners puts power companies at an increased risk of financially motivated […]

The Danger of Cyberattacks on the Water Sector


As the only public utility service that we physically consume, a cyberattack on the nation’s water sector can have dangerous and even life-threatening consequences. And with a wealth of data to protect and an expanding attack surface caused by digitalization, cybersecurity vulnerabilities are prevalent — in the past year, 10% of water utilities have reported […]

The Impact of Supply Chain Cyber Attacks


Supply chains encompass virtually every business in every industry. Built not just around the flow of goods and services, but the flow of information, supply chains exist wherever a transaction takes place, spanning each step from production to delivery. Given their interdependent nature, compromising a business supply chain can be a lucrative technique for cyber […]

Centripetal Announces Cybersecurity Partnership with Dynics

Centripetal Cybersecurity Partnership

RESTON, Va. and ANN ARBOR, Mich., May 18, 2022 — Centripetal today announced a new partnership with Dynics, Inc. providing clients with integrated industrial cybersecurity protection that extends from the internet to the factory floor. “Our integration with Dynics combines their ICS Defender solution with our CleanINTERNET intelligence-driven, network defense service,” said Jonathan Rogers, COO at Centripetal. “Cyberattacks are prolific and […]

What is IIoT and How Does It Impact Cybersecurity In Manufacturing?

IIoT and Cybersecurity for Manufacturing

The Industrial Internet of Things (IIoT), a sub-category of the Internet of Things (IoT), has been transformative for many industries. A market sized at over $263 billion in 2021, IIoT encompasses sensor-embedded devices, cloud-based data, and interconnected machines which reduce downtime, improve performance, and lower costs. Manufacturing firms are leading the charge in IoT adoption; […]

How Threat Intelligence Provides Better Security for the Finance Sector

Cyber Threat Intelligence in the Finance Sector

The financial sector continues to be one of the most heavily attacked industries, so it makes sense that it consistently spends more than others on cybersecurity. Bank of America, for instance, claimed just last year that it spends more than a billion dollars a year in cybersecurity. Much of that, no doubt, inspired by the […]

Cyberattacks on Food and Agriculture – How Hackers Target Our Most Critical Industry

Food and Agriculture industry

Our lives depend on the food and agriculture industry. It’s a vital part of our Critical National Infrastructure (CNI), and has huge financial value, contributing $1.055 trillion to the US GDP in 2020 (a 5% share). But hackers see the world’s dependence on food and agriculture as an opportunity to target the industry with cyberattacks […]

How to Defeat Ransomware with ThreatOps

Defeating Ransomware with ThreatOps

Over the last few years, we’ve seen quite an uptick around a host of new cyberthreat intelligence (CTI) solutions promising to help combat the steady rise in ransomware attacks. If you’re not familiar with them, CTI solutions were designed to collect publicly available cyberthreat data from across the globe that they could package and sell […]