Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations

Posts by author

Marcus Fowler

5 posts
Marcus Fowler is director of strategic threat at Darktrace.
  • Threats & Vulnerabilities

The future of cybersecurity: Ransomware groups aim for maximum destruction

  • Marcus Fowler
  • April 18, 2022
Courtesy: CFE Media
In parallel to the global COVID-19 pandemic, there has been a growing ransomware pandemic. Researchers discovered that ransomware attacks on U.S. organizations tripled in 2021 compared to 2020 and attacks on U.K. organizations doubled. This…
Share
Courtesy: CFE Media
Read More
    • Threats & Vulnerabilities

    The future of cybersecurity: Ransomware groups aim for maximum disruption

    • Marcus Fowler
    • February 14, 2022
    In parallel to the global COVID-19 pandemic, there has been a growing ransomware pandemic. Darktrace researchers discovered that ransomware attacks on U.S. organizations tripled in 2021 compared to 2020, and attacks on U.K. organizations doubled.…
    Share
    Read More
      • IIoT & Cloud

      IoT security: The threat before us

      • Marcus Fowler
      • November 2, 2021
      Attackers are increasingly gaining footholds into corporate environments to conduct ransomware or data theft operations via Internet-connected smart devices. Whether they be printers, lockers, aquariums or conference rooms, these seemingly innocuous access points to corporate…
      Share
      Read More
        • Threats & Vulnerabilities

        Unintended consequences: When a cyberattack goes wild

        • Marcus Fowler
        • September 28, 2021
        In 1988, a Harvard graduate began an experiment to see how many computers were connected to the Internet. Twenty-four hours later, 10% of all computers around the world had been taken down, and the damages…
        Share
        Read More
          • Threats & Vulnerabilities

          The elevation of cybercrime to terrorism threat status

          • Marcus Fowler
          • August 17, 2021
          Prior to the late ’90s, terrorist groups were most often viewed through the lens of law enforcement and crime, not as a national security priority. Their pursuit was led by the FBI and international police…
          Share
          SUBSCRIBE

          GET ON THE BEAT

          Keep your finger on the pulse of top industry news

          SUBSCRIBE TODAY!
          VULNERABILITY PULSE
          • Berkeley Internet Name Domain (BIND) - May 19, 2022
          • Mitsubishi Electric - May 19, 2022
          • Apache - May 16, 2022
          • CISA - May 16, 2022
          • Joint Cybersecurity Advisory - May 17, 2022

          RECENT NEWS

          • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
          • Will CISA recommend securing industrial control systems?
          • How to implement layered industrial cybersecurity in volatile times
          • Throwback Attack: DDoS attacks are born in the Big Ten
          • Improve two-factor authentication system security

          EDUCATION BEAT

          Introduction to Cybersecurity within Cyber-Physical Systems

          Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

          REGISTER NOW!
          HACKS & ATTACKS
          • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
          • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
          • Minimizing the REvil impact delivered via Kaseya servers
          • Key takeaways from 2020 ICS-CERT vulnerabilities
          Industrial Cybersecurity Pulse

          Copyright 2022 CFE Media and Technology.
          All rights reserved.


          BETA

          Version 1.0

          • Content Partners
          • Contact Us
          • Privacy Policy
          • Terms and Conditions

          Input your search keywords and press Enter.

          By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
          Manage consent

          Privacy Overview

          This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
          Necessary
          Always Enabled
          Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
          Non-necessary
          Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
          SAVE & ACCEPT