Search
Close this search box.

Networks

The key elements of cybersecurity management are strategy, operational excellence and organizational engagement. Courtesy: Meditechsafe

Three ways to ensure and optimize cybersecurity maturity

The closing months of 2020 saw a 45% increase in cyber-attacks targeted towards healthcare organizations. Healthcare providers of all types and sizes have been breached. A report by Black Book Market Research predicts that data […]

Egregor ransomware: Gone but not forgotten

Egregor ransomware: Gone but not forgotten

Ransomware groups are coming and going faster than ever. In June alone, we saw Avaddon release its decryption keys unprompted and disappear from sight, while members of CLOP were arrested in Ukraine. The move follows […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Three benefits of a 360-degree vulnerability assessment

Defending critical infrastructure environments requires 360-degree visibility into asset and network vulnerabilities, which is why a vulnerability assessment is so important. Vulnerability management teams often face difficulties in patching all of their systems on a […]

Image courtesy: Brett Sayles

How the remote workforce has changed data security

As we made an almost overnight move to a remote workforce as a result of the pandemic, we have increased data security risks and new risks for data exfiltration. The result of this is inevitable […]

Courtesy: CFE Media and Technology

Looking into the cybersecurity future through the past

Hackers, with the backing of a foreign power, infiltrated the Pickett Gap water treatment facility in Tennessee with a remote viral attack. Thankfully, plant managers were able to avert the crisis and prevent thousands of […]

Unlikely cybersecurity targets are a myth

Unlikely cybersecurity targets are a myth

The Colonial Pipeline, Iranian Centrifuges, large financial companies and large companies in general, big cities – these are the notable targets of cyber attackers. Seen within this context, it is easy to assume your company […]

The key elements of cybersecurity management are strategy, operational excellence and organizational engagement. Courtesy: Meditechsafe

Three ways to ensure and optimize cybersecurity maturity

The closing months of 2020 saw a 45% increase in cyber-attacks targeted towards healthcare organizations. Healthcare providers of all types and sizes have been breached. A report by Black Book Market Research predicts that data […]

Egregor ransomware: Gone but not forgotten

Egregor ransomware: Gone but not forgotten

Ransomware groups are coming and going faster than ever. In June alone, we saw Avaddon release its decryption keys unprompted and disappear from sight, while members of CLOP were arrested in Ukraine. The move follows […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Three benefits of a 360-degree vulnerability assessment

Defending critical infrastructure environments requires 360-degree visibility into asset and network vulnerabilities, which is why a vulnerability assessment is so important. Vulnerability management teams often face difficulties in patching all of their systems on a […]

Image courtesy: Brett Sayles

How the remote workforce has changed data security

As we made an almost overnight move to a remote workforce as a result of the pandemic, we have increased data security risks and new risks for data exfiltration. The result of this is inevitable […]

Courtesy: CFE Media and Technology

Looking into the cybersecurity future through the past

Hackers, with the backing of a foreign power, infiltrated the Pickett Gap water treatment facility in Tennessee with a remote viral attack. Thankfully, plant managers were able to avert the crisis and prevent thousands of […]

Unlikely cybersecurity targets are a myth

Unlikely cybersecurity targets are a myth

The Colonial Pipeline, Iranian Centrifuges, large financial companies and large companies in general, big cities – these are the notable targets of cyber attackers. Seen within this context, it is easy to assume your company […]

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES