The three T's of device lifecycle management

The three T's of device lifecycle management

In today’s highly technological world, devices are at the heart of organizational operations. Whether it’s a sophisticated surveillance camera with advanced features or a simple access control panel, the smooth functioning of these devices is critical for seamless operations across the enterprise. The failure of even a single device can trigger a cascade of frustration and reduced productivity. This is why effective device lifecycle management is so important; it can prevent disruptions and enhance both…

Read More

European Cyber Resilience: How the EU Can Patch the Weak Spots in its Collective Armour

European Cyber Resilience: How the EU Can Patch the Weak Spots in its Collective Armour

In the thrust and parry of cyber resilience, the European Union (EU) has forged a legal framework made of many pieces to fortify its digital defences. Yet, there remain two clear weak spots in Europe’s collective armour: the presence of unsupported connected devices within critical infrastructure networks and the opacity surrounding the handling of newly discovered, or obtained, vulnerabilities by government agencies. In this blog, I delve into these two crucial issues for EU policymakers…

Read More

Hao-Wei Chen | Top Cybersecurity Leaders 2024

Hao-Wei Chen | Top Cybersecurity Leaders 2024

With frequent childhood moves, Hao-Wei Chen had to learn how to adapt from an early age. He frequently experienced culture shock while attending different schools to accommodate his father’s career shifts, having to learn new languages alongside his regular studies. Chen’s introduction to the security field came when he was 17. Chen’s introduction to the security field came when he was 17. Working as a developer and security tester, he launched the educational website Hacker.org.tw…

Read More

Shannon Brewster | Top Cybersecurity Leaders 2024

Shannon Brewster | Top Cybersecurity Leaders 2024

When Shannon Brewster took his first job out of college at a telecommunications company, he never would have thought his career would take him down the cybersecurity path. “In that job, as a Senior Enterprise Solutions Manager, I was exposed to cybersecurity elements in terms of the engineering of networks and designing of networks,” he recalls. That exposure certainly piqued his interest. In 2013, while working at AT&T as Director of Sales, Industry & Mobility…

Read More

Agniane Stealer: Information stealer targeting cryptocurrency users

Agniane Stealer: Information stealer targeting cryptocurrency users

The Agniane Stealer is an information-stealing malware mainly targeting the cryptocurrency wallets of its victims. It gained popularity on the internet starting in August 2023. Recently, we have observed a distinct campaign spreading it across our telemetry. Our recent study has led to the successful identification and detailed analysis of a previously unrecognized network URL pattern. Our researchers have recently uncovered more information on the malware’s methods for file collection and the intricacies of its…

Read More

SMB employees may be the cause of cyber compromises

SMB employees may be the cause of cyber compromises

SMB employees may be the cause of cyber compromises | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Consider the human factor in cyber breaches

Consider the human factor in cyber breaches

Consider the human factor in cyber breaches | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

USB cyberattacks pose a threat to manufacturing & industrial sector

USB cyberattacks pose a threat to manufacturing & industrial sector

USB cyberattacks pose a threat to manufacturing & industrial sector | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

A new approach to healthcare cybersecurity

A new approach to healthcare cybersecurity

<!– A new approach to healthcare cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More
1 2