blog - 2022-11-22
Larry Prince is the Vice President of Engineering at Q-Net Security. He manages a team of engineers and assists with product management tasks such as mapping out the product development strategy for Q-Net devices.
Read More
blog - 2022-11-09
For years, critical Infrastructure such as defense, utilities and telecommunications have been “under siege” – operating under a constant threat of cyberattack. From the Colonial Pipeline attack to the rise of nation-state attacks, these escalating risks have recently been documented in the 2022 Thales Data Threat Report: Critical Infrastructure Edition.
Read More
blog - 2022-10-27
Missouri-based hardware cybersecurity firm Q-Net Security have today announced that Marc Rogers – internationally-renowned ‘white hat’ hacker and member of the US Ransomware Taskforce – has joined the team as Chief Security Officer (CSO).
View as PDFRead More
blog - 2022-10-08
Andrew Quirin is the Chief Architect at Q-Net Security, where he oversees new product development and assists with the technical aspect of sales. After working with Q-Net Security as a graduate student, Andrew officially joined the Q-Net team in 2017, whilst acquiring his M.S. in Electrical Engineering from SIU.
Read More
blog - 2022-07-01
On January 19, 2022, Q-Net, along with Network Perception, acted as co-title sponsors for (CS)²AI (see-say for short), providing four critical speakers for an online symposium titled “Control System Cyber Security for Energy—Part 2 Electric Sector.” (CS)²AI is a nonprofit dedicated to educating and supporting professionals that have the job of securing control systems. It provides a space for this county’s greatest minds to come together to discuss cybersecurity solutions that could help save billions of people from cyber-ruin.
Read More
blog - 2022-06-01
On January 19, 2022, Q-Net, along with Network Perception, acted as co-title sponsors for (CS)²AI (see-say for short), providing four critical speakers for an online symposium titled “Control System Cyber Security for Energy—Part 2 Electric Sector.” (CS)²AI is a nonprofit dedicated to educating and supporting professionals that have the job of securing control systems. It provides a space for this county’s greatest minds to come together to discuss cybersecurity solutions that could help save billions of people from cyber-ruin.
Read More
blog - 2022-01-11
Cybersecurity in ICS and manufacturing systems is, unfortunately, lacking. Data shows that attacks on the manufacturing sector are increasing. One study, titled Manufacturers Alliance for Productivity and Innovation (MAPI), showed that 40% of manufacturing firms were targets of cyberattacks in just one year. Out of those targets, 38% suffered more than $100 million in monetary losses. With attacks on the rise for the manufacturing sector, it’s important to ask why.
Read More
blog - 2021-10-01
October is our favorite month, not only because of the changing leaves and fantastic fall weather but also because it's National Cybersecurity Awareness Month! That's right; an entire month dedicated to our greatest passion—cybersecurity.
Read More
blog - 2021-07-20
Buildings are becoming increasingly smarter and even more networked than ever before. Gone are the days when a building is simply an electrical system with Wi-Fi capabilities. Now, network connectivity forms a vital part of the function of modern buildings. And while this new era of connectivity has helped to make working spaces more responsive and intelligent, it has also opened these systems up to danger.
Read More
blog - 2021-07-05
Since 2020, there have been an alarming amount of hackings and ransomware attacks throughout the U.S. It has almost become the norm to hear about one of these, but that is unacceptable when we have the technology to prevent them from ever occurring. Incidents like SolarWinds, Accellion, Oldsmar, Verkada, and Colonial Pipeline all could have been prevented.
Read More
blog - 2021-06-02
The recent ransomware attack on JBS Foods highlights how unprepared and at risk our nation’s critical infrastructure is to cyberattack, according to cybersecurity experts.
Read More
blog - 2021-05-26
Much like any other industry, the banking sector has been increasingly migrating into the digital age. Gone are the days when you absolutely must cash or deposit your checks by visiting your local bank in person. You can make nearly any transaction online through your bank. With this continued transition into the digital age, however, comes one more facet to stay on top of — cybersecurity.
Read More
blog - 2021-05-24
Casinos and the gaming industry play an important role in economic development throughout the United States of America (as well as worldwide). With approximately 1,000 casinos in the U.S., the domestic gambling industry is worth $261 billion and holds 1.8 million jobs, according to Casino.org. That also means, however, that they are prime targets for experienced hackers looking to make a big score.
Read More
blog - 2021-05-08
The recent ransomware attack on the Colonial Pipeline is a security breach of deep concern – particularly as it could have been limited.
Read More
blog - 2021-05-08
Like many large and small businesses, utility companies are continuing to invest in the ever-growing digital world. There’s one issue, however, that they face on a daily basis – securing critical infrastructure. This is because more of their systems are starting to become interconnected, making it easier for utility companies to control multiple points with fewer people onsite. It also makes them vulnerable to hackers. That’s why Q-Net Security is sharing more information on which issues utility companies face in cybersecurity.
Read More
blog - 2021-04-22
There’s a way to effectively protect your operating systems and precious data without much effort – employing hardware security (hardsec). Here are the 3 biggest advantages of hardware security and why you should consider investing in it right away.
Read More
blog - 2021-04-06
The recent successful hack of UC Berkeley, and the subsequent leak of personal identifying information, is a major security breach of deep concern - particularly as it could have been prevented.
Read More
blog - 2021-03-29
In the ever-evolving world of technology, people who work with computers know exactly what to do when technical issues occur – call someone skilled in IT (informational technology). If there’s a problem with the hardware itself, however, they may want to contact a person with an expertise in OT (operational technology). Interestingly enough, these two departments have started working more closely together than ever before. So what are the similarities and differences between them?
Read More
blog - 2021-03-29
If you follow a few crucial steps, you can easily mitigate network security threats. Consider these 7 tips to help keep your working environment secure while working from home.
Read More
blog - 2021-03-16
The successful hack of 150,000 security cameras via Silicon Valley security startup Verkada is a major security breach of deep concern, particularly as it could have been prevented.
Read More
blog - 2021-03-16
We live in a world richly abundant in technology that we might not have dreamed of using even 30 years ago. Unfortunately, as technology becomes more sophisticated and the sheer number of endpoint devices rapidly increases, cybercriminals become more dexterous and find countless ways to find weaknesses in businesses’ IT infrastructure.
Read More
blog - 2021-03-16
A vast majority of people understand how to utilize the Internet today thanks to the wide accessibility of technology. There is, however, a reason why most of those same people pay for someone to install, monitor, and maintain their ability to connect online. It takes someone with an expert knowledge of network hardware – the devices and equipment that make the entire experience possible – to consistently do the job right. Here’s a look into several devices that are found at home and in the office.
Read More
blog - 2021-02-17
If you haven’t invested in a solid cybersecurity strategy yet, then you should choose one before you become the latest victim to an insidious cyberattack. The question remains, however: which is a better solution – software security or hardware security?
Read More
blog - 2021-02-11
There are simple, cost-effective solutions on the market to protect water systems and other critical national infrastructure and prevent hacks, like the one in Florida, from ever happening.
Read More
blog - 2021-01-25
While many cybersecurity experts, writing in national publications, are calling for establishment of new "cybersecurity safety boards", a presidentially appointed "cyber czar", and the hiring of more cybersecurity software staff, one expert sees a clear solution "inside the box": Hardware-based Security, also known as HardSec.
Read More
blog - 2021-01-19
If you’ve been keeping up with the news, you’ve probably heard that the U.S. government was hacked last month. If that isn’t alarming enough, then consider this – the Russian hack of SolarWinds’ Orion update, which was only discovered on December 9, 2020, actually began as far back as March, affecting up to 18,000 customers, including Departments of Defense, Energy, State, Homeland Security, Treasury, Commerce, and other federal agencies. Additionally, many Fortune 500, consulting, technology, telecoms, and oil and gas companies operating in North America, Europe, Asia, and the Middle East were also the victims of this ongoing attack.
Read More
blog - 2021-01-05
Imagine if you had the power to essentially rewrite the laws of math and break codes much more easily, even surpassing the power of the late mathematician John Nash. This is the mysterious side of computing that we’ll be discussing here: quantum computing.
Read More
blog - 2021-01-04
Cyberattacks are becoming more common. Almost every day, headlines announce the latest cyberattacks, which target companies of all sizes, expose secrets and precious data, and cost organizations outrageous amounts of money. Cybercriminals are finding more insidious ways to infiltrate a company’s seemingly impenetrable network infrastructure.
Read More
blog - 2020-12-17
Cybersecurity is a constantly evolving field and there are several approaches used to protect information and infrastructure. Overall, these can be identified as strategies for either network intrusion prevention or detection. While both work well in tandem, both can also be used individually and be highly effective.
Read More
blog - 2020-08-28
An independent test conducted by Red Berry Innovations demonstrated the effectiveness of Q-Net Security’s quantum compute-resistant cybersecurity solution in an Industrial Control System (ICS) environment.
View as PDFRead More
blog - 2019-09-01
Cybersecurity attacks are increasingly prevalent and many products have become available for detecting such attacks. However, few products can be found that prevent these malicious attacks. In these pages we examine the advantages of using special-purpose hardware to protect the confidentiality and integrity of data. This protection includes encryption of data, authentication of the data source, verification that the data have not been corrupted and have been transmitted over explicitly authorized links.
Read More