Attack Surface Management 2022 Midyear Review Part 1

Attack Surface Management 2022 Midyear Review Part 1

Attack Surface Management 2022 Midyear Review Part 1 Privacy & Risks In our 2022 midyear roundup, we examine the most significant trends and incidents that influenced the cybersecurity landscape in the first half of the year. By: Trend Micro October 20, 2022 Read time:  ( words) The digital age is an exciting time for businesses as it offers the opportunity to be more efficient and effective with how things are done. Many companies have taken…

Read More

Oil and Gas Cybersecurity: Trends & Response to Survey

Oil and Gas Cybersecurity: Trends & Response to Survey

Q10:Thinking about the last 12 months, post-incident, does your organization make cybersecurity improvements in order to minimize the risks of future attacks? (N=829) Compared to other industries, the disrupted time during cyberattacks is longer and the amount of damage is large, but the result is that they appear to be reluctant to improve cybersecurity. As mentioned above, it is difficult to stop the system, and even maintenance is required once a year, assuming continuous operation….

Read More

Oil and Gas Cybersecurity: Recommendations Part 3

Oil and Gas Cybersecurity: Recommendations Part 3

Oil and Gas Cybersecurity: Recommendations Part 3 Cyber Threats In the final part of our series, we look at the APT33 case study and several recommendations from our expert team. By: Trend Micro August 15, 2022 Read time:  ( words) The oil and gas industry continues to be a prime target for threat actors who want to disrupt the operation and wreak havoc. In part two, we discussed various threats that can affect an oil…

Read More

Oil and Gas Cybersecurity: Threats Part 2

Oil and Gas Cybersecurity: Threats Part 2

Oil and Gas Cybersecurity: Threats Part 2 Cyber Threats In part two of our oil and gas series, we look at more threats that can expose the industry to cyberattacks. By: Trend Micro August 11, 2022 Read time:  ( words) The Russia-Ukraine war has posed threats to the oil and gas industry. Our team even uncovered several alleged attacks perpetrated by various groups during a March 2022 research. In part one, we exhibit how a…

Read More

Forecasting Metaverse Threats: Will it Become Metaworse?

Forecasting Metaverse Threats: Will it Become Metaworse?

The term “metaverse” was first used by Neal Stephenson in his 1992 cyberpunk novel Snow Crash. It describes a virtual world that can be explored using avatars, offering players a completely immersive experience. Today, we see similar worlds in massively multiplayer online role-playing games (MMORPGs) such as Roblox, Minecraft, Fortnite, Second Life, and others, but these games are still nowhere close to the immersive experience described in Snow Crash.  The modern metaverse concept consists of…

Read More

Facebook’s Metaverse is Expanding the Attack Surface

Facebook’s Metaverse is Expanding the Attack Surface

Thirty years ago, Paramount trademarked the name “Holodeck.” An artifact of Star Trek: The Next Generation, the holodeck was a magical, computer-generated world where characters lived in another realm – either a historical place or an entirely fictious domain, based on old movies, books, or a character’s imagination. As in much science fiction, the holodeck’s inner workings were never explained, except when dealing with a malfunction: the safety protocols stopped working, an alien took over the…

Read More

Oil and Gas Cybersecurity: Industry Overview Part 1

Oil and Gas Cybersecurity: Industry Overview Part 1

The oil and gas industry is no stranger to major cybersecurity attacks, attempting to disrupt operations and services. Most of the best understood attacks against the oil industry are initial attempts to break into the corporate networks of oil companies. Geopolitical tensions can cause major changes not only in physical space, but also in cyberspace. In March 2022, our researchers observed several alleged cyberattacks perpetrated by different groups. It has now become important more than…

Read More

Private 5G Network Security Expectations Part 3

Private 5G Network Security Expectations Part 3

Q: Are you or do you expect to use cloud-based capabilities in your private network? Network cloudification?Base: n = 408 Source: 451 Research custom study Coexistence of technology evolution and cybersecurity Openness expands business opportunities, but there are always major security challenges. Many of us will remember the Apache Log4j vulnerability that occurred at the end of 2021. The use of open source is also promoted in O-RAN ALLIANCE mentioned above, but the biggest security…

Read More

Challenges in smart factory and manufacturing cybersecurity

Challenges in smart factory and manufacturing cybersecurity

Challenges in smart factory and manufacturing cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Private 5G Network Security Expectations Part 1

Private 5G Network Security Expectations Part 1

Private 5G Network Security Expectations Part 1 Privacy & Risks Are “new” protocols and “private” networks sufficient for your cybersecurity requirements? By: Jun Morimoto July 05, 2022 Read time:  ( words) Corporate security teams are now facing multiple cybersecurity issues, including complex data privacy and compliance requirements, in addition to the rapidly advancing Digital Transformation. Trend Micro, in collaboration with 451 Research, a part of S&P Global Market Intelligence, conducted a survey on the private…

Read More
1 2 3 4 5 6 7