In the rapid digitization of manufacturing, energy, and critical infrastructure industries, the integration of Operational Technology (OT) with Information Technology (IT) systems is driving innovation and efficiency. However, this convergence brings a pressing concern: cybersecurity threats targeting OT environments...
Operational technology security continues to evolve rapidly. According to Gartner, Security and Risk Management (SRM) leaders, responsible for the technology, information and risk to OT systems, should anchor security efforts to operational resilience in the face of mounting risks by adopting an integrated security...
Secretaries of state and election administrators told the Senate Committee on Rules and Administration that local election offices are facing a critical lack of resources and funding to support essential cybersecurity measures ahead of the upcoming voting cycle.
Exterro has purchased a data discovery vendor led by a GE and Symantec veteran to help organizations detect, measure and remediate risk around structured data. The deal will allow Exterro customers to analyze structured data without ingesting tons of information or putting a load on company systems.
The fallout from the SEC's charges of fraud and internal control failures against SolarWinds and its CISO has implications for the industry. Cordery Compliance attorney Jonathan Armstrong advises security leaders to "take heed and remember that the actions of today can determine your fate tomorrow."
The Australian government is close to introducing standards to shore up the security of the down under country's fast-growing solar market amid reports that Chinese state-sponsored hackers might target internet-connected solar inverters and cause blackouts.
A machine identity management provider led by an ex-Tricentis executive notched a $1.3 billion valuation after getting a minority investment from Sixth Street Group. Keyfactor said the funds will support high market demand for technology that secures devices and simplifies public key infrastructure.
The Clop ransomware operation's recent mass zero-day exploit of Progress Software's MOVEit secure managed file transfer software followed the criminals launching similar attacks against users of Accellion FTA, SolarWinds Serv-U and Fortra GoAnywhere.
As organizations face the constant threat of ransomware attacks, it's essential to understand the nature of this pervasive threat and how organizations can respond effectively, said Angus Clarke, vice president, BSO, Mastercard. The obvious answer is never pay a ransom - most of the time.
CISOs face significant stress on a regular basis in their critical roles to safeguard organizations against the evolving threat landscape. CISOs must build cybersecurity resilience across the enterprise to protect digital assets and operations, advised CISOs Milos Pesic and Don Gibson.
Large enterprises, including government and educational organizations, are being warned to immediately update their WS_FTP Server, built by Progress Software, to fix serious flaws being actively exploited by attackers. Secure file transfer software remains a top target, especially for extortionists.
Increased engagement from boards on digital transformation initiatives around cloud and AI adoption has spurred greater investment in cybersecurity, said Google Cloud CISO Phil Venables. Systems built and designed decades ago have become increasingly difficult to secure, he said.
This week, ISMG editors covered the hot topics at ISMG's London Cybersecurity Summit 2023, including the technical landscape of AI, executive liability, incident response strategies in the face of a global ransomware attack and how to build personal resilience to avoid burnout.
The new Securities & Exchange Commission Cyber Rules mandate a transformation in how publicly traded companies manage cyber risk. To comply, they’ll need to build and deploy systems – within the next five months – to identify, measure and report cyber risk “materiality”. But, current methods are inadequate...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.