Human Factors: Why Technology Alone Will Never Equal Cyber Secure

Human Factors: Why Technology Alone Will Never Equal Cyber Secure

In this episode, Kai Roer, Chief Research Officer at KnowBe4, explains how human factors will always play a role in how secure our technology is. Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com/podcast/the-tripwire-cybersecurity-podcastRSS: https://tripwire.libsyn.com/rssYouTube: https://www.youtube.com/playlist?list=PLgTfY3TXF9YKE9pUKp57pGSTaapTLpvC3 Cybersecurity is a vast professional field.  There is so much technology that can protect all the systems that we use on a daily basis.  All of these systems can help us to remain secure, yet, no matter how many systems are in place, we have…

Read More

Product spotlight on pandemic management and contact tracing solutions

Product spotlight on pandemic management and contact tracing solutions

Product spotlight on pandemic management and contact tracing solutions | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Healthcare Providers Need to Increase Budgets for Cybersecurity

Healthcare Providers Need to Increase Budgets for Cybersecurity

The past few years have emphasized just how important cybersecurity is. As cybercrime reached record heights and more companies went digital, industries realized their current security efforts fell short. Healthcare is a prime example. The medical sector has had the second highest number of data breaches of any industry for more than five years. This became increasingly noticeable in 2019 alone, when the industry experienced 525 data breaches, up from 369 the year before. The…

Read More

Texas SB 820 Advances K-12 Cybersecurity Despite Limitations

Texas SB 820 Advances K-12 Cybersecurity Despite Limitations

Like many organizations, K-12 schools adapted to COVID-19 by accelerating their digital transformation journeys. And like everyone else who followed this path, they invited unwanted attention from digital criminals in the process. In December 2020, for instance, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) issued a joint alert with the FBI and MS-ISAC warning of malicious actors targeting school computer systems to disrupt distance learning with digital threats such as ransomware. More than half…

Read More

Utility Cybersecurity: How Cyber Awareness Can Reduce Future Risk

Utility Cybersecurity: How Cyber Awareness Can Reduce Future Risk

Utility Cybersecurity: How Cyber Awareness Can Reduce Future Risk Compliance & Risks Trend Micro has released a technical report on how the electric utility industry can gain situational awareness across entire network. By: Kazuhisa Tagaya March 14, 2022 Read time:  ( words) The electric utility industry is one of the most critical infrastructure industries that highly affect people’s lives and economic activities. The power grids connect the systems of power generation, substation, transmission, and distribution…

Read More

3 Cybersecurity Certainties for 2022

3 Cybersecurity Certainties for 2022

By Bill Moore, XONA As businesses transitioned to hybrid work models in 2021, critical integrations between IT and OT technologies introduced new vulnerabilities that threat actors exploited with shocking frequency and effectiveness. This was especially true for manufacturers, energy producers, and utilities, which increasingly rely on remote operations capacity to empower distributed teams to engage physical infrastructure from anywhere in the world. As a result, many organizations experienced an ICS/OT cybersecurity incident in the past…

Read More

Secure Energy Operations – Cisco Blogs

Secure Energy Operations – Cisco Blogs

Trend Overview  The Colonial Pipeline incident in the spring of 2021 changed every security conversation in midstream oil and gas. It prompted very disruptive security regulation from the TSA, affecting all midstream operators in the U.S., but it also created awareness in the whole energy industry that security is now a formal requirement. So what does compliance mean and what does “being secure” look like?  The primary principles of secure operations remain the same whether…

Read More

Secure Mine Operations – Cisco Blogs

Secure Mine Operations – Cisco Blogs

Trend Overview  In 2021, the Marsh report printed what many of us were starting to understand:  “The world’s leading mining companies are now unanimous in reporting that cyber threats are a principal risk to them achieving their goals.”Cyber Risk: Threats and Insurance Protection for the Mining Sector.  For the mining industry, security is now a principal requirement. So what does this mean and what does “being secure” look like?  The primary principles of secure operations remain…

Read More

The Digitization of the Power Grid: Substation Automation Edition – Cisco Blogs

The Digitization of the Power Grid: Substation Automation Edition – Cisco Blogs

Trend Overview Electrical substations are the building blocks of an energy grid. They are responsible for regulating and changing voltage levels as electric power flows from generating station to consumer. Many were built decades ago when switching, adjustment, and data collection were done manually, but digital protection and control devices have become more intelligent. New Intelligent Electronic Devices (IEDs) can collect and record diverse system information, process complex logic in microseconds, and decide whether to…

Read More

How to strengthen cyber resilience with Unified BCDR

How to strengthen cyber resilience with Unified BCDR

By Joe Noonan, General Manager, Unitrends and Spanning Cybercrime and hybrid work environments prompted by the pandemic have significantly impacted the way organizations protect and store their data. Data is living in multiple places, and backups now must protect data centers, endpoints, multiple clouds and SaaS. More than ever, IT professionals need to incorporate unified business continuity and disaster recovery (BCDR) plans into their cyber resilience strategy to protect the organizations they serve. Cyber resilience…

Read More
1 3,180 3,181 3,182 3,183 3,184 4,082