This multinational pharmaceutical
company’s supply chain was distributed
across multiple manufacturing plants
and countries. While it had a good
understanding of the number of OT devices
on its networks, it wasn’t able to clearly
see how assets were communicating and
where vulnerabilities and risks...
In the new world of increased cyber risk, approaches that bridge the
IT/OT divide are no longer optional – they’re mission critical. Executive
leadership expects CIOs and CISOs to anticipate and stay ahead of the
enterprise-wide threat landscape, including oversight of cyber risks
related to industrial...
Digital risk is everyone’s business, from the CEO to the end user. Yet in
many organizations, it’s the IT department that is tasked with managing
and minimizing it.
Gartner predicts that by 2023, 75% of organizations will expand their risk
management programs to address new cyber-physical systems...
As society deals with the second year of the COVID-19 pandemic,
organizations are accelerating digitization to survive and thrive. This
places more focus on operational systems, which are at the heart of
value and revenue creation.
Adding to challenges, cybersecurity is ranked by executives as the
second highest...
Industrial networks are quickly adopting Internet of Things (IoT) technologies
to reduce costs and deliver more value to customers and shareholders.
Unfortunately, this trend is creating new security risks, as many organizations
lack the ability to monitor and secure their IoT assets.
The challenges will only...
The U.S. National Security Agency has issued "zero trust" guidance aimed at securing critical networks and sensitive data within key federal agencies. The NSA adds it is also assisting Defense Department customers with the zero trust implementations.
This edition of the ISMG Security Report features an analysis of the impact of a hacking campaign linked to Russia’s Sandworm that targeted companies using Centreon IT monitoring software. Also featured: a discussion of CIAM trends; a critique of Bloomberg's update on alleged Supermicro supply chain hack.
The Biden administration is reviewing former President Donald Trump's policies addressing potential national security and cybersecurity concerns about Chinese-owned companies as it develops new plans for dealing with a wide range of issues tied to China.
CIOs and CISOs have now been charged with
addressing the cybersecurity risks of OT and IoT,
as well as Enterprise IT, environments. Because of
this, they are now looking to establish a holistic
route to cybersecurity management across the
broader technology stack.
Download this whitepaper to learn about what...
The latest edition of the ISMG Security Report features an analysis of the critical security issues raised by the hacking of a Florida city water treatment plant. Also featured: The CISO of the World Health Organization discusses supply chain security; hackers steal celebrities' cryptocurrency.
Police have arrested 10 individuals suspected of being part of an international gang that targeted U.S. celebrities by using SIM-swapping attacks to steal cash and more than $100 million in cryptocurrency. Authorities say hackers continue to target cryptocurrency holders and exchanges.
As the investigation into the hacking of a water treatment facility in Florida continues, cybersecurity experts say the incident points to the urgent need to enhance operational technology security. Here are five key questions the incident raises.
Researchers at the security firm Netlab have identified a previously undocumented botnet dubbed "Matryosh" that is targeting vulnerable Android devices to help build its network so it can conduct distributed denial-of-service attacks.
Ordr as a Representative Vendor in their recently released Market Guide for Operational Technology (OT) Security! The convergence of IT and OT calls for a multifunction platform that can discover all network connected devices, profile how they are communicating and properly assess the risk associated. This is why...
Based on real-world experience and research, this whitepaper shares insights into five of the most dangerous and common IaaS configuration mistakes that could expose your public cloud computing environment to a worst-case security scenario. These are:
Early hacked administrative credentials
Exposed data...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.