Regulations

Courtesy: CFE Media and Technology

The impact of proposed SEC cybersecurity rules on public companies

In March of 2022, the Securities and Exchange Commission (SEC) proposed amendments to its cybersecurity rules and regulations. The proposed changes would require reporting of cyber incidents and disclosure of cyber mitigation strategies, both leading […]

Best practices in OT vulnerability management

Best practices in OT vulnerability management

Whether an organization is managing vulnerabilities within information technology (IT) or operational technology (OT) systems, prioritization stands as a huge factor for impactfully reducing the risk of attacks that leverage flaws within these systems. Organizations […]

Will CISA recommend securing industrial control systems?

Will CISA recommend securing industrial control systems?

The Cybersecurity and Infrastructure Security Agency (CISA) has always made recommendations along the lines of keeping the attackers out, performing cyber hygiene and detecting attacks, but they have rarely recommended the monitoring and controlling of […]

As threat increases, college cybersecurity programs are more in demand

More connected industrial workers: How are companies mitigating risk?

Learning Objectives Industrial remote workers have increased the number of remote connections. Cybersecurity risk increases with more remote connections. How are industrial companies mitigating risk? Connected workers are appearing in every industry and industrial activity. […]

Courtesy: CFE Media and Technology

How ransomware gangs leverage security compliance

Compliance regulations like the California Consumer Privacy Act (CCPA) and General Data Protection Regulation (GDPR) are created with good intentions. They aim to secure user data, ensure privacy and build trust between the companies and […]

Courtesy: CFE Media and Technology

The impact of proposed SEC cybersecurity rules on public companies

In March of 2022, the Securities and Exchange Commission (SEC) proposed amendments to its cybersecurity rules and regulations. The proposed changes would require reporting of cyber incidents and disclosure of cyber mitigation strategies, both leading […]

Best practices in OT vulnerability management

Best practices in OT vulnerability management

Whether an organization is managing vulnerabilities within information technology (IT) or operational technology (OT) systems, prioritization stands as a huge factor for impactfully reducing the risk of attacks that leverage flaws within these systems. Organizations […]

Will CISA recommend securing industrial control systems?

Will CISA recommend securing industrial control systems?

The Cybersecurity and Infrastructure Security Agency (CISA) has always made recommendations along the lines of keeping the attackers out, performing cyber hygiene and detecting attacks, but they have rarely recommended the monitoring and controlling of […]

As threat increases, college cybersecurity programs are more in demand

More connected industrial workers: How are companies mitigating risk?

Learning Objectives Industrial remote workers have increased the number of remote connections. Cybersecurity risk increases with more remote connections. How are industrial companies mitigating risk? Connected workers are appearing in every industry and industrial activity. […]

Courtesy: CFE Media and Technology

How ransomware gangs leverage security compliance

Compliance regulations like the California Consumer Privacy Act (CCPA) and General Data Protection Regulation (GDPR) are created with good intentions. They aim to secure user data, ensure privacy and build trust between the companies and […]

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES