Always-on defense: The critical role of monitoring in manufacturing cyber protection

Always-on defense: The critical role of monitoring in manufacturing cyber protection

Manufacturing processes are intricately woven into the fabric of our daily lives, from the food on our tables to the devices we depend on and securing these operations is more crucial than ever. Industry 4.0 has introduced a wave of digital advancements that promise unparalleled efficiency but also expose manufacturers to a new realm of cyber threats. In the first half of 2024, Critical Start’s biannual Threat Intelligence Report highlighted a significant uptick in cyberattacks across various…

Read More

Calling for backup: The importance of disaster recovery

Calling for backup: The importance of disaster recovery

These days, everyone knows the importance of backing up their data. Everything needs to be backed up — from a laptop to the cloud platform on which many businesses rely. It feels fairly simple.  Unfortunately, with bad actors finding new ways to attack businesses every day, nothing is ever that easy. Threat actors know good backups are the cheat code to not paying the ransomware, giving victims the ability to rewind the clock to before…

Read More

The multi-faceted threat of domestic terrorism

The multi-faceted threat of domestic terrorism

Geopolitical threats have been a top security concern for years. Issues such as climate change increase the likelihood of severe weather, while the impact of international conflicts can be felt all over the world. Closer to home, U.S. organizations also have to manage the risk of domestic terrorism. While far from a new issue, domestic terrorism has been a growing concern in the United States for the past few years. The current definition of domestic…

Read More

Stopping Supply Chain Attacks with Cisco's User Protection Suite

Stopping Supply Chain Attacks with Cisco's User Protection Suite

The Dinner Party Supply Chain Attack A supply chain attack occurs when a bad actor gains access to an organization’s people and data by compromising a vendor or business partner. Let’s think of this type of attack as if it was a dinner party. You invite your close friends over and hire a catering company that you know and trust to cook the meal. However, neither you nor the caterer were aware that one of…

Read More

Stopping Supply Chain Attacks with Cisco's User Protection Suite

Stopping Supply Chain Attacks with Cisco's User Protection Suite

The Dinner Party Supply Chain Attack A supply chain attack occurs when a bad actor gains access to an organization’s people and data by compromising a vendor or business partner. Let’s think of this type of attack as if it was a dinner party. You invite your close friends over and hire a catering company that you know and trust to cook the meal. However, neither you nor the caterer were aware that one of…

Read More

The cat and mouse ransomware game may threaten smaller organizations

The cat and mouse ransomware game may threaten smaller organizations

The practice of cybersecurity is ever-changing, marked by a continual dance between the attackers and the defenders. Each side is in a constant state of adaptation, reacting to the strategies of the other. The ongoing evolution of ransomware cybercrime is a prime illustration of this dynamic. Historically, ransomware attacks were somewhat isolated events. Today, they have morphed into coordinated global threats that target essential infrastructure, seeking substantial ransoms. The audacious attack on UnitedHealth by the…

Read More

Mitigating Lateral Movement with Zero Trust Access

Mitigating Lateral Movement with Zero Trust Access

Security service edge (SSE) technology was created to protect remote and branch users with a unified, cloud-delivered security stack. To understand how SSE solutions protect organizations and their users, it’s worthwhile to analyze attacker techniques, as well as the protections and controls SSE solutions use to disrupt them. It’s useful to use the MITRE ATT&CK framework. MITRE ATT&CK is a large knowledgebase of attacker techniques that cybersecurity experts use to describe the attack kill chains…

Read More

Report: AI cybersecurity market projected to exceed $133 billion

Report: AI cybersecurity market projected to exceed 3 billion

A report by Techopedia has provided insights into the influence of AI on the cybersecurity industry. Key findings of the report include the projected value of the AI cybersecurity market, the expenses and savings associated with using AI to identify data breaches, and opinions on AI from cybersecurity professionals.  The report estimates that the value of the global AI cybersecurity market is expected to surpass $133 billion from 2023 to 2030. AI has strengthened cybersecurity…

Read More

Cyber Security Trends to Watch in Australia in 2024

Cyber Security Trends to Watch in Australia in 2024

Ransomware attacks on infrastructure and mid-market businesses are tipped to rise, while the use of AI cyber tools will grow as IT customers seek more signal and less noise from vendors. The year 2023 was a big year for cyber security professionals in Australia. While IT teams continued to deal with the fallout of some big Australian data breaches, the new 2023-2030 Australian Cyber Security Strategy was released to boost defences against future threats. Experts…

Read More

Why are phishing attacks destroying SMBs?

Why are phishing attacks destroying SMBs?

Phishing scams have become an all-too-common threat. Through spear fishing, vishing and other forms of social engineering, cybercriminals trick business owners and employees into disclosing sensitive information like credentials and passwords, eventually resulting in data breaches and ransomware installations on a business’s network. According to Accenture, 43% of cyberattacks are aimed at small businesses. But why have these attacks become so prevalent and so successful? Macro trends have pushed workplaces to permanently adopt a hybrid…

Read More
1 2 3 12