Moving OT to the cloud means accounting for a whole new host of security risks

Moving OT to the cloud means accounting for a whole new host of security risks

ICS systems managed via cloud software are open to exploits that could be destructive enough to cause physical damage to industrial systems. Here’s how to protect your operational technology network. chombosan, Getty Images/iStockphoto In the race to move operational technology (OT) and industrial control systems (ICS) to the cloud, critical vulnerabilities in popular cloud management software from CODESYS and programmable logic controllers (PLCs) made by WAGO Corp. have been uncovered.  The report, from Claroty research…

Read More

IT/OT Convergence or IT/OT Integration? | The State of Security

IT/OT Convergence or IT/OT Integration? | The State of Security

IT/OT convergence is an oft-repeated term, and maybe it’s the wrong term. From a technology standpoint, IT/OT convergence has been occurring since at least the 1990s when HMI/Operator Stations began running on Windows and when Ethernet began displacing deterministic custom LAN protocols in the OT realm. This technology convergence has continued with networking, cybersecurity, virtualization, edge, zero trust, etc. The biggest change since the 1990s is that the time lag between technology being common in…

Read More

New Bill Could Force U.S. Businesses to Report Data Breaches Quicker

New Bill Could Force U.S. Businesses to Report Data Breaches Quicker

A bipartisan Senate bill would require some businesses to report data breaches to law enforcement within 24 hours or face financial penalties and the loss of government contracts. The legislation from Senate Intelligence Chair and Democratic Senator Mark Warner with Republican Senators Marco Rubio and Susan Collins is just one of several new cybersecurity bills that will likely be debated this year. If passed, the bill could require certain U.S. businesses to do much more…

Read More

Going passwordless: Future-proofing your digital identity

Going passwordless: Future-proofing your digital identity

Going passwordless: Future-proofing your digital identity | 2021-07-19 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The Economics of VMC on Dell EMC – VMware Cloud Community

The Economics of VMC on Dell EMC – VMware Cloud Community

Over the past year, in my work as a Cloud Economist here at VMware supporting the VMC on Dell EMC offering, I’ve had the privilege to run TCO analysis with many organizations across multiple industries and locations. In that time, I have found that some of these TCO studies produce negative results, but for a few industries and their use cases, the results are positive. Here are a few observations. But first, a word on…

Read More

Vaccine passports have to be consistent so that all countries can recognize them, expert says

Vaccine passports have to be consistent so that all countries can recognize them, expert says

This might create problems for those from poorer countries. Their countries may not have the resources to create vaccine passports that are readable everywhere. TechRepublic’s Karen Roby spoke with Marc Rogers, executive director for cybersecurity at Okta, about vaccine passports. The following is an edited transcript of their conversation. Karen Roby: Marc, obviously, we’ve talked to you many times in the past regarding ransomware and pretty much every other security issue. Today, though, a hot…

Read More

US DoJ indicts four members of China-linked APT40 cyberespionage group

US DoJ indicts four members of China-linked APT40 cyberespionage group

US DoJ indicted four members of the China-linked cyberespionage group known as APT40 for hacking various entities between 2011 and 2018. The U.S. Justice Department (DoJ) indicted four members of the China-linked cyber espionage group APT40 (aka TEMP.Periscope, TEMP.Jumper, and Leviathan) for hacking tens of government organizations, private businesses and universities around the world between 2011 and 2018. “The defendants and their Hainan State Security Department (HSSD) conspirators sought to obfuscate the Chinese government’s role in such theft by establishing…

Read More

Top 5 things to know about supply chain attacks

Top 5 things to know about supply chain attacks

Worried about supply chain attacks? Tom Merritt can help you understand your risk. Whether its Stuxnet, SolarWinds or Microsoft Exchange, chances are you’ve read about supply chain attacks. But, hey, you follow all the security procedures right? You’re not going to get targeted, right? Hmm. Here are five things to know about supply chain attacks. It doesn’t target you. It targets your suppliers. Hence the name. You trust your suppliers so you let them in…

Read More
1 2,320 2,321 2,322 2,323 2,324 2,730