Key OT Cybersecurity Challenges: Availability, Integrity and Confidentiality

Key OT Cybersecurity Challenges: Availability, Integrity and Confidentiality

Organisations are still underestimating the risks created by insufficiently secured operational technology (OT). One current example comes from Germany. According to a report by heise.de, external security testers consider it “likely” that a successful serious cyberattack against the publicly owned water company Berliner Wasserbetriebe could lead to a complete failure of the German capital’s waste water management. The good news, at least for Germany, is that a combination of engineering standards and legal requirements often…

Read More

Nations—Not Individuals—Are After Your IP – Cyber Defense Magazine

Nations—Not Individuals—Are After Your IP – Cyber Defense Magazine

By Ryan Benner, Anexinet  A recent Wall Street Journal article titled, Russian Hackers Have Targeted 200 Groups Tied to U.S. Election, has Microsoft stating that “Russian government hackers have targeted at least 200 organizations tied to the 2020 U.S. election in recent weeks, including national and state political parties and political consultants working for both Republicans and Democrats.” The article goes on to point out that other bad actor nations such as China and Iran…

Read More

For Federal Agencies, Securing Internet of Things Devices Is A Growing Challenge – Cyber Defense Magazine

For Federal Agencies, Securing Internet of Things Devices Is A Growing Challenge – Cyber Defense Magazine

By Katherine Gronberg, Vice President of Government Affairs, Forescout In June, the cybersecurity company JSOF, with help from Forescout, released some eye-opening research about a set of 19 vulnerabilities, collectively known as Ripple20. The Ripple20 vulnerabilities are found within the TCP-IP protocol code sold by Ohio-based software company, Treck, and are used by a wide range of Internet of Things (IoT) and Operational Technology (OT) devices. An OT device refers to a specific type of…

Read More

Threat Roundup for November 27 to December 4 – Cisco Blogs

Threat Roundup for November 27 to December 4 – Cisco Blogs

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between November 27 and December 4. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats. As a reminder, the information provided for the following threats in this post is non-exhaustive and…

Read More

2020 Hindsight – Top 10 Highlights from McAfee | McAfee Blogs

2020 Hindsight – Top 10 Highlights from McAfee | McAfee Blogs

2020 has been a tumultuous and unpredictable year, where we restructured our lives and redefined how we work and interact with each other. In the past nine months, we saw IT security and the digital world challenged and taken to new heights. Although 2020 has undoubtedly been a year of trials and tribulations, I wanted to share some of McAfee’s top highlights. The list that follows is drawn from some of this year’s greatest accomplishments….

Read More

Virtual Solutions for a Virtual World – Cisco Blogs

Virtual Solutions for a Virtual World – Cisco Blogs

As they began planning the worldwide broadcast of their Global Innovation Challenge,  Logicalis team members knew they faced a huge challenge. As a socially minded company, Logicalis had challenged its 6500 employees to come up with innovative ways to solve social or environmental problems facing their communities by leveraging Cisco’s broad technology portfolio. Logicalis has taken a leadership position in bringing to market innovative applications that solve real-world problems by combining its intellectual property with…

Read More

AI Collaborative Research Institute Launched

AI Collaborative Research Institute Launched

A trio of companies is launching a new research institute whose intended purpose is to strengthen privacy and trust for decentralized artificial intelligence (AI).  The Private AI Collaborative Research Institute, originally established by Intel‘s University Research & Collaboration Office (URC), is launching as a joint project involving digital security and privacy products vendor Avast and AI software-defined secure computing hardware services company Borsetta. “As AI continues to grow in strength and scope, we have reached a point where action is…

Read More

Most used passwords for 2020: The internet’s favorite curse word, name, food, and team

Most used passwords for 2020: The internet’s favorite curse word, name, food, and team

CyberNews analyzed more than 15 billion passwords; if your favorite one is at the top of the list, it’s time to change right now. RayaHristova, Getty Images/iStockphoto “World’s Best Boss” Michael Scott caused an unplanned power outage (he’s used both a space heater and fan on high and in the same socket). Power returns nearly immediately, but the server now needs a password Jim Halpert says, in a memorable scene from NBC’s long-running “The Office.” “Did…

Read More

Smart Sex Toy Sales Surge Poses Security Risk

Smart Sex Toy Sales Surge Poses Security Risk

A cybersecurity company has urged the rising number of smart sex toy owners to think about protection. Sales of internet-connected sex toys, also known as teledildonics, have increased since lockdown measures were introduced to slow the spread of COVID-19.  In March alone, sex toy revenue in France, Italy, and Spain, where lockdown measures were particularly stringent, exceeded projected figures by 94%, 124%, and 300%, respectively. In “Cybersecurity Trends 2021: Staying secure in uncertain times,” ESET researchers Denise Giusto and…

Read More

Cybersecurity In An Age Of Financial Threats: A Q&A With Proofpoint’s CFO

Cybersecurity In An Age Of Financial Threats: A Q&A With Proofpoint’s CFO

The ongoing Covid-19 crisis emphasizes the importance of cybersecurity. getty Cyberthreats are constantly evolving and posing new – and dangerous – challenges to every company and industry, with corporate finance departments especially at risk. For that reason, the CFO of a company that creates and sells cybersecurity software must be one step ahead of the fraudsters. This month, I have spoken with three different software company CFOs to glean insights about this industry and how…

Read More
1 3,480 3,481 3,482 3,483 3,484 3,584