Securing Public Spaces Without a Perimeter

Securing Public Spaces Without a Perimeter

In a time of mass shootings, economic uncertainty and political unrest, public safety is an ever-important problem. While organizations such as schools and hospitals have responded through tightening visitor restrictions, this isn’t always possible for public-facing organizations. Public parks, shopping malls and even some government buildings all have to remain open to the public in some capacity, making security potentially difficult. GOVERNMENT BUILDINGS Government buildings face a number of security risks. Government and legislative officials,…

Read More

Best practices for effectively securing sensitive data

Best practices for effectively securing sensitive data

Best practices for effectively securing sensitive data | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

S4x23 Review Part 4: Cybersecurity for Industrial IoT

S4x23 Review Part 4: Cybersecurity for Industrial IoT

Bellotti said first that we should start with the realization that legacy technologies are successful technologies. Legacy technologies remain because they are usable and important. They are the foundation for other systems therefore it has a significant impact when they are changed. But people believe in some myths of modernization. First, the technology is regarded as old. It doesn’t matter if the technology is new or old. For example, Python is older than Java, and…

Read More

S4x23 Review Part 3: Healthcare Cybersecurity Sessions

S4x23 Review Part 3: Healthcare Cybersecurity Sessions

COVID Task ForceIn 2017, before the pandemic, he was involved in providing a report to improve cybersecurity in the healthcare industry as a member of the Healthcare Cybersecurity Task Force. The report raised concerns that the healthcare industry was in the critical condition, suggesting severe lack of security talent, legacy equipment, premature/over-connectivity, vulnerabilities impacting patient care, and an epidemic of known vulnerabilities. He later worked on initiatives to protect medical care during the pandemic as…

Read More

S4x23 Review Part 2: Evolving Energy Cybersecurity

S4x23 Review Part 2: Evolving Energy Cybersecurity

While public-private partnerships may have been successful for large businesses, small businesses with limited financial and human assets still face challenges. The 100-day plan has certainly advanced cybersecurity in the energy sector by focusing on ICS security and grid security and facilitating coordination between public and private entities and agencies. However, challenges have been raised in the areas of information sharing among small utilities, solutions tailored for them, and sustainable initiatives. Innovative threat intelligence and…

Read More

S4x23 Review Part 1: What’s New in OT Security

S4x23 Review Part 1: What’s New in OT Security

In this blog, I will introduce discussions from S4 over several posts. The first installment will cover two topics from the academic interviews. Interview with Michael Fischerkeller – Author of Cyber Persistence Theory Fischerkeller is a senior researcher in the Institute for Defense Analyses and has been involved in shaping US government security policy for over 25 years. Based on this experience, he published “Cyber Persistence Theory” with two co-authors, aiming to bridge the gap…

Read More

Monthly Threat Webinar Series in 2023: What to Expect

Monthly Threat Webinar Series in 2023: What to Expect

2023 will be the ninth year of doing my monthly threat webinar series that I love.  Each month I select a threat or a research report to discuss with my audience that I think can help educate them on the latest trends in the threat landscape.  Over the years, I’ve covered such threats as advanced persistent threats (APT), botnets, crypto mining, fileless, key loggers, messaging, ransomware, spyware, trojans, vulnerabilities, web threats, and zero days.  One…

Read More

Secure code training ruled better investment than code scanning tools

Secure code training ruled better investment than code scanning tools

Secure code training ruled better investment than code scanning tools | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

CISO’s Challenges Involved with Business Leader & SOC

CISO’s Challenges Involved with Business Leader & SOC

Yohei Ishihara, IoT security evangelist at Trend Micro, discussed the challenges CISOs facing within organizations driving industrial IoT. As the cyber and physical worlds converge, the responsibilities of CISO, the cybersecurity leader of an organization, are becoming broader and deeper. However, they are not necessarily backed by management and don’t have enough resources. CISOs themselves are concerned about an ever-expanding attack surface and already admit spiraling out of control. From a CISO’s perspective, business leaders…

Read More

Protecting S3 from Malware: The Cold Hard Truth

Protecting S3 from Malware: The Cold Hard Truth

Cloud object storage is a core component of any modern application. When files move through your applications, it’s critical to protect your systems and users from malicious files. Trend Micro has provided cloud-native, scalable file protection for our customers since 2020. We’re now starting to see other vendors try to catch up by bringing similar capabilities to the market, but frankly I’m underwhelmed with their offerings. I love the cloud security space because there is…

Read More
1 2 3