The Telecommunications Security Bill introduced by the British government aims to set enforceable, minimum security standards for the nation's telecommunications providers, backed by penalties, including for any company that opted to use equipment from high-risk providers such as China's Huawei.
This report unlocks visibility in your converged OT and IoT networks for accelerated security and digital transformation. Guardian delivers network visualization, asset inventory, vulnerability assessment, and threat detection in a single application. Download report to know more.
Download this whitepaper report to manage unique security challenges posed by mission-critical operational environments containing IP-enabled devices and complex, interconnected networks and the use of unified visibility and systems to stay ahead of risks.
The first six months of 2020 saw an increase in threats to OT and IoT networks, especially IoT botnet, ransomware and COVID-19-themed attacks. These attack types align with global computing and socio-economic trends. The rapid rise in IoT devices and connections, the worldwide COVID-19 pandemic, and the increasing...
Gartner Research predicts the SaaS market will grow to $104.7 billion this year as organisations continue to shift from on-premises license software to subscription based SaaS models. It’s a trend that is occurring in OT as well as IT.
As Gartner notes in its 2020 Hype Cycle for Managing Operational Technology,...
The U.S. Senate on Tuesday unanimously passed federal IoT security legislation that will require the government to only procure devices that meet minimum cybersecurity requirements. The bill now moves to President Donald Trump's desk.
IoT devices are like sausages: They're full of components of varying quality, and it's invariably disturbing to think about their origins. New guidance helps address how to reduce the risk of potentially vulnerable components in connected devices.
Distributed denial-of-service attacks have not garnered much attention this year. But analysts say such attacks could surge, and they have the potential to be just as damaging as ransomware and other types of cyberthreats.
The operators behind a botnet dubbed "Gitpaste-12" are abusing legitimate services such as GitHub and Pastebin to help hide the malware's malicious infrastructure, according to Juniper Threat Labs. This botnet mainly targets Linux apps and IoT devices and can mine cryptocurrency.
Newly updated Food and Drug Administration guidelines will help experts to more accurately score and communicate the criticality of security vulnerabilities identified in medical devices, says Elad Luz, head of security research at CyberMDX.
The latest edition of the ISMG Security Report features a discussion with FBI Agent Elvis Chan on the cyber disruptions to expect immediately after the Nov. 3 U.S. election. Also featured: smart lock security flaws; cryptocurrency-funded crimes in 2021.
Although IoT door locks are ultimately designed to keep people out, they may actually be the way in. Craig Young of Tripwire describes problems he found in U-tec's Ultraloq and other issues with IoT security.
So far, much of the discussion about 5G security has focused on avoiding the use of technology from Chinese manufacturers, including Huawei and ZTE. But security experts are increasingly concerned that 5G network and device providers rushing products to market aren't devoting enough attention to security.
As our workforce becomes increasingly disparate and fluid, privileged access is emerging as a key cyber security concern for many organisations.
Gartner cited privileged access management as the number one project for CISOs for the past two years. But, according to Thycotic research, 66% of CISOs struggle to get...