Exiger Helps Safeguard Sensitive Research

Exiger’s Bibliometric Illumination capabilities rapidly spot malign and unwanted influence networks involving research institutions and institutions of higher education. By identifying foreign talent acquisition programs at home and abroad, Exiger can trace foreign influence networks, one-way tech transfer paths and risks to USG-funded research and highlight what IP, PEO or other emerging technology has been put […]

Cybersecurity Predictions For 2023

The Stack asked industry professionals for 2023 cybersecurity predictions and received a wealth of responses. The biggest takeaway from their findings was clear: This conversation should emphatically extend to business leaders and the board. Read the full article on The Stack below:  Related reading: Supply Chains Need Better Cyber Risk Management Vendor and Supply Chain […]

NATO Tests AI’s Ability To Protect Critical Infrastructure Against Cyberattacks

CSO‘s Michael Hill tapped Exiger’s Bob Kolasky to discuss a recent NATO experiment that tested and measured AI’s efficiency in collecting data. The AI also assisted teams responding to cyberattacks against critical systems and services, along with highlighting the need for tools that improve collaboration between humans and machines to reduce cyber risk. Bob illustrates […]

TechCrunch: Ransomware is a Global Problem Needing a Global Solution

TechCrunch Ransomware

Despite last year’s optimism on progress made combatting cyber criminals, 2022 looks to become the worst year on record for ransomware attacks. A recent report shows that attacks have increased by 80% year-over-year and that the cybercriminals responsible for these attacks have easily dodged law enforcement action by taking advantage of ransomware as a service, […]

Biden Administration Racks Up Cybersecurity Accomplishments

The Biden administration’s intense focus on cybersecurity has resulted in an unprecedented number of initiatives. Although domestic efforts seem well-baked, opportunities exist for further leadership in the international arena. Cynthia Brumfield from CSO spoke with Exiger’s Bob Kolasky on the next steps for cybersecurity-related orders and policies: Read the full article on CSO below: 

Bloomberg Radio: Bob Kolasky on Security in Technology

On weekdays, Bloomberg Money Minute combines compelling consumer and business news with a quick update of the markets in a 60-second report. In today’s segment, Exiger’s Senior Vice President for Critical Infrastructure, Bob Kolasky, talks about the necessary cyber practices and protections to manage risk: It’s important that companies demonstrate that they are putting in […]

Financial Times: What Ukraine’s Cyber Defense Tactics Can Teach Other Nations

One of the surprises of the Russia-Ukraine war has been that Ukraine’s cybersecurity has, so far, proved as resilient as its military. In modern war, cyber attacks aim to destroy or destabilize critical national infrastructure. However, the fragmented nature of Ukraine’s communications network for vital services means it cannot be knocked out or jammed as […]

Demo The
Exiger Platform

Save the Day
Be a supply chain superhero