The Next Disruptive ICS Attacker: An Advanced Persistent Threat (APT)?

The Next Disruptive ICS Attacker: An Advanced Persistent Threat (APT)?

No discussion on ICS attacks could be complete without talking about what some would call, ‘the elephant in the room.’ Critical infrastructure has always been a target for warfare, and modern ICS are no exception. Several high-profile ICS disruptions have in fact been attributed to malicious hackers working at the behest of a military or intelligence agency. Looking at Examples of APTs The potential impact of a wartime ICS cyber incident is hard to understate….

Read More

Bronze Optis: Innovative Technologies at Black Hat

Bronze Optis: Innovative Technologies at Black Hat

By Olivia Gallucci, Cybersecurity Reporter, Cyber Defense Magazine I interviewed approximately sixty industry leaders from over forty companies who attended Black Hat. Although this article series—The Optis—can be read as a traditional Black Hat recap, I specifically highlight twenty-one companies that stand out and whose growth I recommend watching. Rochester Institute of Technology’s Cybersecurity Club, RITSEC, inspired the metrics I used to analyze and rank companies. Specifically, I adopted RITSEC’s motto, “Security Through Community,” while…

Read More

People Behind CSR at Cisco: How Cisco drives an inclusive, sustainable future through the circular economy – Cisco Blogs

People Behind CSR at Cisco: How Cisco drives an inclusive, sustainable future through the circular economy – Cisco Blogs

Welcome to our blog series on the people behind Corporate Social Responsibility (CSR) at Cisco. Each blog in this series will highlight a different Cisco employee who works closely with CSR initiatives across the company. Enabling an inclusive future for all requires that we care for the planet we all share and do our part to address global challenges. A key tenet of this is enabling a circular economy, moving from a linear economy where products are developed with the expectation of a…

Read More

Top SD-WAN vendors and how they got there

Top SD-WAN vendors and how they got there

Even in the midst of the pandemic, revenues from SD-WAN grew 18.5% from 2019 to 2020, and is expected to grow another 26.5% this year, according to IDC. In the research firm’s forthcoming Worldwide SD-WAN Infrastructure Forecast, IDC projects compound annual growth of 18.9% through 2025, when total revenues will top $7 billion. “We expected to see a significant drop due to the pandemic, dragging the growth rate down to at least single digits,” said…

Read More

Airline Employee Jailed for Spending Passengers’ Money

Airline Employee Jailed for Spending Passengers’ Money

A former United Airlines employee has been sent to prison for stealing passengers’ financial data and using it to make fraudulent purchases.  Hayder Lefta, of Manchester, New Hampshire, worked as a customer service representative at Manchester-Boston Regional Airport in 2018 and 2019. Court documents showed that while assisting customers at the airport, the 25-year-old made a copy of their credit card numbers.  Lefta later used these stolen card details to purchase airline flights and meals…

Read More

Rethinking Network Architecture with Routed Optical Networking – Cisco Blogs

Rethinking Network Architecture with Routed Optical Networking – Cisco Blogs

We know the future of connectivity is wireless and Cisco is continuing to disrupt the market through innovation. These technologies are not only changing the design of the internet but ensuring the connections are better than ever. Currently, 3 billion people on the planet are underserved in terms of internet access. Cisco is challenging the status quo of how we build and manage networks to build an inclusive future for all – rethinking how networks…

Read More

US Hospitals Divert Care After Cyber-attack

US Hospitals Divert Care After Cyber-attack

A cyber-attack forced hospitals in West Virginia and Ohio to divert patients to other care providers and work from paper records. Threat actors targeted Memorial Health System with ransomware on the morning of August 15. The assault disrupted the IT systems at nearly all the health system’s 64 clinics and three hospitals – Marietta Memorial, Selby General, and Sistersville General. By midnight on Sunday, the hospitals were turning away patients, except for heart-attack, stroke and trauma patients, and sending them…

Read More

Expert: Cyberattacks in the energy sector put lives in danger

Expert: Cyberattacks in the energy sector put lives in danger

Zero-trust is a good way to prevent hackers from gaining control of our infrastructure and energy industries, expert says. TechRepublic’s Karen Roby spoke with Greg Valentine, solution director for Capgemini, about cybersecurity in the energy sector. The following is an edited transcript of their conversation. SEE: Security incident response policy (TechRepublic Premium) Karen Roby: Greg, we talk a lot about now more than ever, the energy sector and cybersecurity, and people are realizing more and…

Read More

Learn How to Deploy Cisco Secure Firewall in Cloud Native Environments

Learn How to Deploy Cisco Secure Firewall in Cloud Native Environments

The working world’s shift to remote work and hybrid work conditions has many companies under pressure to adapt their network environments quickly. As a result, many companies are selecting a multi-cloud architecture to stay progressive. And with this influx of new users, it’s safe to say those cloud environments are set to be a permanent fixture. Now, multi-cloud may sound interesting, but to transition some real challenges. For example, how will companies start using the…

Read More
1 3,635 3,636 3,637 3,638 3,639 4,037