Information as a barrier to progress: aligning infosec goals with business needs

Information as a barrier to progress: aligning infosec goals with business needs

Information as a barrier to progress: aligning infosec goals with business needs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Securing all that data from your physical security and IT systems

Securing all that data from your physical security and IT systems

Securing all that data from your physical security and IT systems | 2020-12-07 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

The pervasive problem of inferior detection in your SOC

The pervasive problem of inferior detection in your SOC

The pervasive problem of inferior detection in your SOC | 2020-12-07 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Some Thoughts from the NCSC 2020 Annual Review

Some Thoughts from the NCSC 2020 Annual Review

The National Cyber Security Centre (NCSC) released its annual review of 2020.  If you are unfamiliar with the NCSC, part of their mission is that they are “dedicated to making the United Kingdom the safest place in the world to live and work online.”   This is a lofty goal, and since the first report, issued in 2016, the NCSC remains steadfast in its vision. This year’s report, which spans the period from September 2019 through…

Read More

Key OT Cybersecurity Challenges: Availability, Integrity and Confidentiality

Key OT Cybersecurity Challenges: Availability, Integrity and Confidentiality

Organisations are still underestimating the risks created by insufficiently secured operational technology (OT). One current example comes from Germany. According to a report by heise.de, external security testers consider it “likely” that a successful serious cyberattack against the publicly owned water company Berliner Wasserbetriebe could lead to a complete failure of the German capital’s waste water management. The good news, at least for Germany, is that a combination of engineering standards and legal requirements often…

Read More

Nations—Not Individuals—Are After Your IP – Cyber Defense Magazine

Nations—Not Individuals—Are After Your IP – Cyber Defense Magazine

By Ryan Benner, Anexinet  A recent Wall Street Journal article titled, Russian Hackers Have Targeted 200 Groups Tied to U.S. Election, has Microsoft stating that “Russian government hackers have targeted at least 200 organizations tied to the 2020 U.S. election in recent weeks, including national and state political parties and political consultants working for both Republicans and Democrats.” The article goes on to point out that other bad actor nations such as China and Iran…

Read More

For Federal Agencies, Securing Internet of Things Devices Is A Growing Challenge – Cyber Defense Magazine

For Federal Agencies, Securing Internet of Things Devices Is A Growing Challenge – Cyber Defense Magazine

By Katherine Gronberg, Vice President of Government Affairs, Forescout In June, the cybersecurity company JSOF, with help from Forescout, released some eye-opening research about a set of 19 vulnerabilities, collectively known as Ripple20. The Ripple20 vulnerabilities are found within the TCP-IP protocol code sold by Ohio-based software company, Treck, and are used by a wide range of Internet of Things (IoT) and Operational Technology (OT) devices. An OT device refers to a specific type of…

Read More

Threat Roundup for November 27 to December 4 – Cisco Blogs

Threat Roundup for November 27 to December 4 – Cisco Blogs

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between November 27 and December 4. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats. As a reminder, the information provided for the following threats in this post is non-exhaustive and…

Read More

2020 Hindsight – Top 10 Highlights from McAfee | McAfee Blogs

2020 Hindsight – Top 10 Highlights from McAfee | McAfee Blogs

2020 has been a tumultuous and unpredictable year, where we restructured our lives and redefined how we work and interact with each other. In the past nine months, we saw IT security and the digital world challenged and taken to new heights. Although 2020 has undoubtedly been a year of trials and tribulations, I wanted to share some of McAfee’s top highlights. The list that follows is drawn from some of this year’s greatest accomplishments….

Read More

Virtual Solutions for a Virtual World – Cisco Blogs

Virtual Solutions for a Virtual World – Cisco Blogs

As they began planning the worldwide broadcast of their Global Innovation Challenge,  Logicalis team members knew they faced a huge challenge. As a socially minded company, Logicalis had challenged its 6500 employees to come up with innovative ways to solve social or environmental problems facing their communities by leveraging Cisco’s broad technology portfolio. Logicalis has taken a leadership position in bringing to market innovative applications that solve real-world problems by combining its intellectual property with…

Read More
1 3,356 3,357 3,358 3,359 3,360 3,460