US and Canada OSPAs nomination deadline approaching

US and Canada OSPAs nomination deadline approaching

<!– US and Canada OSPAs nomination deadline approaching | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Remote Operations in Oil & Gas

Remote Operations in Oil & Gas

Trend Overview “Remote Asset Operations” was seen as the highest RoI investment out of all ten use cases described in the 2020 survey by JWN. The Digital Oilfield Report that published these findings goes on to identify “Remote Asset Inspection” and “Remote Asset Monitoring” to be the second and third choice by survey respondents. Remote operations are key to leveraging digital technology in the oilfeild. A few years ago, everyone believed the way to achieve…

Read More

Autonomous Operations in Mining

Autonomous Operations in Mining

Trend Overview By the end of 2021, Caterpillar has hauled more than 4 billion tons of product and driven more than 145 million kilometers autonomously. As an aside, that’s the distance of a round trip to Mars. Autonomous technology is mature. Perhaps haulage is the simplest of all autonomous problems to solve and has the most significant return on investment. In 2017, Rio Tinto identified that in one year, each of their autonomous trucks had…

Read More

#InfosecurityEurope2022: The Critical Yet Often Invisible Role Cryptography Plays in Our Lives

#InfosecurityEurope2022: The Critical Yet Often Invisible Role Cryptography Plays in Our Lives

On the opening day of Infosecurity Europe 2022, Professor Keith Martin delivered a keynote speech focusing on the critical yet often invisible role cryptography plays in our everyday lives, enabling us to protect our information and share it securely. The session saw Martin explain how cryptography is used and revealed the many crucial ways we depend on cryptographic technology. Martin began by asserting a common theme heard across the day from multiple speakers: emphasizing the responsibility we all…

Read More

Targeted voicemail phishing attacks hits specific US industries’ verticals

Targeted voicemail phishing attacks hits specific US industries’ verticals

A new wave of targeted voicemail phishing attacks has been hitting US companies in selected verticals since May 2022. The campaign’s goal is to collect Office 365 credentials of legitimate corporate users. Image: Rogatnev/Adobe Stock Email phishing campaigns are regularly hitting organizations in the U.S., but voicemail phishing is less common. A new report from Zscaler exposes a new attack scheme  begun in May 2022 that aims to collect valid credentials for Office 365 mailboxes….

Read More

4 ways to streamline security operations centers

4 ways to streamline security operations centers

<!– 4 ways to streamline security operations centers | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime

Tenable Research Reveals “Do-It-Yourself” Ransomware Kits Have Created Thriving Cottage Industry of Cybercrime

The self-sustaining ransomware industry earned $692m from collective attacks in 2020 The shift to the subscription economy has created a new norm in the as-a-service world. And it’s not just Netflix and Spotify that have adopted this business model. New research from Tenable®, the Cyber Exposure company, found that one of the main reasons ransomware has prospered is due to the advent of ransomware-as-a-service (RaaS) which has catapulted ransomware from a fledgling threat into a…

Read More

RSA 2022: Cyber Attacks Continue to Come in Ever-Shifting Waves

RSA 2022: Cyber Attacks Continue to Come  in Ever-Shifting Waves

Supply chains, trust, and the Internet itself remain prime targets.  When Russia launched wide-ranging cyber-attacks while its army invaded Ukraine, it also deployed waves of wiper malware to destroy data.   The first wave targeted the data on the disks. As Ukraine fortified its defenses in that area, the second wave left the data on the disks alone and went after the metadata. The third wave bypassed the two previous targets and attacked the file systems….

Read More

Understanding the Ransomware Ecosystem: From Screen Lockers to Multimillion-Dollar Criminal Enterprise

Understanding the Ransomware Ecosystem: From Screen Lockers to Multimillion-Dollar Criminal Enterprise

A new report from Tenable Research explores the key players in the ransomware ecosystem and the tactics that have helped propel it from a fledgling cyberthreat into a force to be reckoned with. Ransomware is a constantly evolving cyberthreat, and it is through its evolution that ransomware has managed to not only survive, but thrive. There are a number of reports that detail ransomware’s evolution, from the earliest form of ransomware known as the AIDS…

Read More

Identity-Related Breaches Hit 84% of US Firms in 2021

Identity-Related Breaches Hit 84% of US Firms in 2021

The number of security breaches stemming from stolen or compromised identities has reached epidemic proportions, according to new data from the non-profit Identity Defined Security Alliance (IDSA). The IDSA polled 500 US identity and security professionals to compile its 2022 Trends in Securing Digital Identities report. It found that 84% had experienced an identity-related breach in the past year, with the vast majority (78%) claiming it had a direct business impact. Part of the problem is the soaring volumes…

Read More
1 2,920 2,921 2,922 2,923 2,924 4,096