Tempered Blog

Municipality Exposure Makes the Case for Advanced Challenge-Response Authentication and Virtual Air Gaps

Kevin Peterson | 02/12/2021

Water treatment and Sewage treatment plants are arguably the most vulnerable critical infrastructure in the United States.

Protect Critical Infrastructure secure communications Airwall

Use Airwall Teams to Set Up a Secure Home Minecraft Server

Rick Suehring | 02/06/2021

There are a lot of hosted Minecraft servers out on the Internet, but after a while it isn’t much fun playing with a bunch of random people. Most tips for setting up your own Minecraft server describe adding a port forward in your home router WHICH IS VERY INSECURE and leaves your home network vulnerable to hackers. Using Airwall Teams, you can set up a Minecraft server that can only be accessed by your friends and keep the bad guys out of your home network.

secure communications Airwall Teams Minecraft

New Customers in 2020 Point to Growing Needs for Zero Trust Architectures

Gary Kinghorn | 02/01/2021

2020 brought great challenges to companies as well as individuals. We’re proud to have been able to help a growing number of organizations improve their security posture and resiliency. While energy providerand municipalities continue to rely on Tempered, we’re also seeing increased activity in the healthcare sector. The rising scourge of ransomware and the highly vulnerable state of medical devices have proven to be key concerns. 

Airwall Zero Trust

Industry 4.0 and the Secure Networking Gap

Matt Hadreas | 01/28/2021

What is Industry 4.0?

Industry 4.0 (or I4.0) is essentially digital transformation for manufacturing. It is a nod to the three previous industrial revolutions of steam, electricity, computer-systems, and now the internet.

Protect Critical Infrastructure OT/IT Convergence Industry 4.0

Emerging SolarWinds-type Compromises: Can You Really Burn It All Down?

Gary Kinghorn | 01/04/2021

Legendary security technologist, Bruce Schneier, recently wrote an article in The Guardian summarizing the impact of the SolarWinds security breach last month, and it’s probably a lot worse than people think. (The breach that is, the article was great!). If you don’t know the gory details of the attack, our CTO, Bryan Skene, covered it nicely hereSchneier was also quoted in an earlier analysis of the hack by noting how extensive the breach was throughout many of our nation’s most sensitive military and industrial networks, and, in fact, the extent of the compromise in each network, or how many networks, may not be known for years. 

Airnet SolarWinds Micro-segmentation Airwall Zero Trust

Devastating SolarWinds Compromise Makes the Case for: Microsegmentation, Virtual Airgaps and Secure Overlay Fabrics

Bryan Skene | 12/15/2020

The compromise of ubiquitous network management software from SolarWinds announced today is the most recent reminder of how vulnerable existing networks still can be even with layers of security tools and policies in place that have built up over the last several decades. History may show that this was the most extensive and impactful cybersecurity attack ever when the vulnerability allowed complete compromise of the network traffic and hosts for more than 425 of the US Fortune 500, all ten of the top US telecommunications companies, all branches of the military, the top five US accounting companies and hundreds of universities and colleges. 

SolarWinds Micro-segmentation

Introducing Airwall Teams: Our Free Zero Trust Remote Access and Private Network Solution

Rich Langston | 12/11/2020

A secure way to connect

I’m excited to announce Tempered has released Airwall Teams, a revolutionary new secure communications platform – and it is free to use forever. Airwall Teams allows customers to build secure communications channels between devices, regardless of where they are. Safely share data across mobile, corporate, internet, and cloud networks in just a few minutes. What do you need to connect?

secure communications Airnet

The Airwall Company

Rick Moy | 12/03/2020

securing physical infrastructure

Securing physical infrastructure (like OT and IoT networks) poses unique and intractable challenges to organizations, because the risks and impacts of failure are higher. While traditional OT environments have been secured by a physical air gap, external connectivity requirements (like cloud analytics) and digital transformation initiatives have eroded those air gaps and introduced tremendous risks.

Protect Critical Infrastructure OT/IT Convergence