UK’s CNI Security Threatened by Staff Burnout

UK’s CNI Security Threatened by Staff Burnout

The security of the UK’s transport, energy and other critical national infrastructures (CNI) could be threatened by staff burnout and IT skills shortages, according to new research from cybersecurity services company Bridewell Consulting. The firm discovered that, in the last year, 85% of IT decision-makers working to protect Britain’s infrastructure have felt increased pressure to improve cybersecurity controls. Of those, 47% have suffered unsustainable stress, 41% have been absent because of burnout, 32% are looking…

Read More

NaaS: Network-as-a-service is the future, but it’s got challenges

NaaS: Network-as-a-service is the future, but it’s got challenges

As-a-service offerings have been around for more than 10 years with roots that are decades older than that, and now this ever-expanding category of service offerings includes enterprise network-as-a-service. NaaS enables enterprises to outsource network functionality at network Layers 4-7—such as software-defined WAN (SD-WAN) and application delivery controller (ADC)—as well as Layers 1-3, which includes switches and routers. Full adoption of NaaS is still in its early days because most enterprise network functions require physical…

Read More

German MPs Hit by Russian-Backed Phishing Attacks

German MPs Hit by Russian-Backed Phishing Attacks

German lawmakers have been targeted once again by phishing attacks reportedly linked to Russian intelligence services. Local reports claimed yesterday that seven members of the Bundestag and 31 members of the state parliament had their inboxes compromised, although these appear to have been personal rather than official accounts. The phishing emails were spoofed to appear as if urgent messages sent by providers GMX and T-Online. The politicians belong to governing parties the CDU/CSU and SPD….

Read More

The Best Network Protection: Go Deep or Go Broad?

The Best Network Protection: Go Deep or Go Broad?

By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors and practitioners have wrestled with choices between going deep and going broad for their security solutions. Mostly, the choice varies between predominantly one or the other. Going deep typically means careful monitoring and analysis of certain types of threats or behaviors at the cost of not examining a much broader range of activity. Solutions that are broader may lack…

Read More

Peer-To-Peer Cybersecurity Insights For 2021

Peer-To-Peer Cybersecurity Insights For 2021

Based on real practitioners’ experiences By Stuart Berman, IT Central Station Super User December is typically a month when people who work in the IT field offer predictions for the coming year. 2020 has been a highly atypical year, however, so it’s a bit daunting to think about what’s coming over the horizon. Yet, my company is in a unique position to engage in prognostication. We source user data directly from users in the trenches….

Read More

5 minutes with Tony Howlett – Vendor risk management needs to be a top security priority in 2021 and beyond

5 minutes with Tony Howlett – Vendor risk management needs to be a top security priority in 2021 and beyond

5 minutes with Tony Howlett – Vendor risk management needs to be a top security priority for organizations in 2021 and beyond | 2021-03-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the…

Read More

Cybersecurity risk – increased by the pandemic – redefines the workplace

Cybersecurity risk – increased by the pandemic – redefines the workplace

Cybersecurity risk – increased by the pandemic – redefines the workplace | 2021-03-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

The evolving role of user experience in security

The evolving role of user experience in security

The evolving role of user experience in security | 2021-03-27 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

The impact of COVID-19 on emergency communications

The impact of COVID-19 on emergency communications

The impact of COVID-19 on emergency communications | 2021-03-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

NIST SP 800-172 release couldn’t come at a better time

NIST SP 800-172 release couldn’t come at a better time

NIST’s timely new release of Special Publication (SP) 800-172 (formerly referred to in draft form as 800-171B) provides exactly what its title says, Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST SP 800-171. Yet it goes a step further to protect controlled unclassified information (CUI) specifically from APTs. According to Scott Goodwin, IT audit and security supervisor with OCD Tech and Tripwire guest blog contributor, the latest NIST guidance “…introduces 33…

Read More
1 3,534 3,535 3,536 3,537 3,538 3,876