IT Network Attacks Can Impact Your OT Networks, Too

IT Network Attacks Can Impact Your OT Networks, Too

On May 8th, I was at a gas station filling up my car before a trip I was taking when the news about a cyberattack against a large pipeline company broke. The attack led them to halt all operations. Ultimately, the incident stemmed from a ransomware infection in which a well-known threat actor took volumes of corporate data in just two hours and made their demands including the threat to block and encrypt the company’s…

Read More

CloudHealth Secure State’s Playbook to Operationalize Cloud Security Posture Management – VMware Cloud Community

CloudHealth Secure State’s Playbook to Operationalize Cloud Security Posture Management – VMware Cloud Community

Four years ago, when CloudHealth Secure State founders were researching the cloud market, it was hard to ignore the growing list of companies that ended up in the news headlines due to simple misconfiguration mistakes leading to massive data breaches. A closer look revealed that the security teams in many of these companies had tools, but were struggling with cloud visibility. They were getting the security alerts but didn’t know where to focus their resources…

Read More

#RSAC: The Security Risks of Cryptocurrency

#RSAC: The Security Risks of Cryptocurrency

Cryptocurrency, most notably Bitcoin, has become increasingly popular and valuable in recent years and with it have come a number of associated security risks, according to a pair of security experts speaking at the 2021 RSA Conference on May 19. Kenneth Geers, external communications analyst at Very Good Security, used the first part of the presentation to explain the history of money and why the US dollar has emerged as the world’s dominant reserve currency. “Good money…

Read More

Biden’s executive order calls for greater open source security but not how to achieve it

Biden’s executive order calls for greater open source security but not how to achieve it

Commentary: It’s progress that President Biden’s executive order recognizes the need to secure open source software. What it doesn’t do is address the best way to accomplish it. Image: iStockPhoto/maxkabakov It was just a matter of time before David Recordon’s impact on the U.S. federal government would be felt. Shortly after President Biden took office, he named Recordon the White House Director of Technology, coming a few years after Recordon ran open source initiatives at…

Read More

Through Your Mind’s Eye: What Biases Are Impacting Your Security Posture? | McAfee Blogs

Through Your Mind’s Eye: What Biases Are Impacting Your Security Posture? | McAfee Blogs

Cybersecurity and biases are not topics typically discussed together. However, we all have biases that shape who we are and, as a result, impact our decisions in and out of security. Adversaries understand humans have these weaknesses and try to exploit them. What can you do to remove biases as much as possible and improve your cybersecurity posture across all levels of your organization? Cybersecurity personnel have many things to address and decisions to make…

Read More

Mythic AI gets funding to mass-produce edge chips

Mythic AI gets funding to mass-produce edge chips

Just six months after unveiling its first AI inferencing processor, Mythic AI has announced a new round of funding for $70 million in Series C investment to begin mass production of its chips and to develop its next generation of hardware and software products. In November, the company announced the M1108 Analog Matrix Processor (AMP) aimed at edge AI deployments across a wide range of applications, including manufacturing, video surveillance, smart cities, smart homes, AR/VR,…

Read More

Housekeeping Pitfalls of Vulnerability Management

Housekeeping Pitfalls of Vulnerability Management

By Srinivas Mukkamala, Co-Founder and CEO, RiskSense Vulnerability management doesn’t always get the attention it needs until it’s too late. Vulnerability management is siloed and is slow to adapt to digital transformation and the associated attack surface risk. Applications, software-as-a-service, cloud, containers, open-source and DevOps continuous integration and development all need to be assessed in order to achieve cohesive visibility into risk. These pitfalls allow exposure points that adversaries leverage to infiltrate. In worst-case scenarios,…

Read More

How to Prevent Ransomware Attacks On Industrial Networks

How to Prevent Ransomware Attacks On Industrial Networks

Insights into Ransomware attacks, how they spread in industrial networks, and how to prevent them from happening. By Michael Yehoshua, VP of Global Marketing, SCADAfence Since the outbreaks of Wannacry & NotPetya ransomware attacks in 2017, we’ve been witnessing daily occurrences of attacks affecting OT networks that originated on the IT side. The U.S. National Security Agency (NSA) also highlighted this issue for this very simple reason. It works. Ransomware Works That’s the simplest way to explain why incidents…

Read More

NFTs are cool, but they’re a hot target for hackers: How to keep them safe

NFTs are cool, but they’re a hot target for hackers: How to keep them safe

Security expert says non-fungible tokens are a really exciting possibility for artists, but they can be stolen. He offers some ways to keep them secure. TechRepublic’s Karen Roby spoke with Rick McElroy, principal cybersecurity strategist with VMware Carbon Black, about security concerns with non-fungible tokens. The following is an edited transcript of their conversation. SEE: The CIO’s guide to quantum computing (free PDF) (TechRepublic) Karen Roby: Rick, set the stage first for what NFTs are….

Read More
1 3,370 3,371 3,372 3,373 3,374 3,574