Regulations

How the CMMC impacts the Department of Defense supply chain

How the CMMC impacts the Department of Defense supply chain

The U.S. Department of Defense (DoD) supply chain has been under attack. This year’s ransomware events — such as the ones faced by a U.S. maritime base that brought cameras, door-access control systems and critical […]

The elevation of cybercrime to terrorism threat status

The elevation of cybercrime to terrorism threat status

Prior to the late ’90s, terrorist groups were most often viewed through the lens of law enforcement and crime, not as a national security priority. Their pursuit was led by the FBI and international police […]

ROI-minded integration decision aspects. Courtesy: Meditechsafe

Changing a network security approach

Most organizations rely heavily on security architects to vet products and assemble optimal solutions that align with security, technology, and business requirements. These technical experts spend a disproportionately large amount of energy on the integration […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Companies need to reassess their cyber physical security risk

Due to innovative business models behind ransomware-as-a-service, fundamental increase in reliance on vulnerable information technology (IT) systems by physical process controls and the evolving cyber insurance market means that every industrial organization needs to reassess […]

Bridging the cybersecurity leadership gap

Bridging the cybersecurity leadership gap

Ransomware attacks have skyrocketed in recent years. There is no sign of slowing down despite the increase in spending and risk awareness. Cybersecurity personnel often feel burned-out and relatively ineffective. They are constantly firefighting, and […]

Differences between local and international cybersecurity standards

Differences between local and international cybersecurity standards

The Federal Service for Technical and Export Control (FSTEC) is a difficult topic, but it is essential to explore in order to understand how this strict Russian regulation affects cybersecurity tool manufacturers and system integrators. […]

How the CMMC impacts the Department of Defense supply chain

How the CMMC impacts the Department of Defense supply chain

The U.S. Department of Defense (DoD) supply chain has been under attack. This year’s ransomware events — such as the ones faced by a U.S. maritime base that brought cameras, door-access control systems and critical […]

The elevation of cybercrime to terrorism threat status

The elevation of cybercrime to terrorism threat status

Prior to the late ’90s, terrorist groups were most often viewed through the lens of law enforcement and crime, not as a national security priority. Their pursuit was led by the FBI and international police […]

ROI-minded integration decision aspects. Courtesy: Meditechsafe

Changing a network security approach

Most organizations rely heavily on security architects to vet products and assemble optimal solutions that align with security, technology, and business requirements. These technical experts spend a disproportionately large amount of energy on the integration […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Companies need to reassess their cyber physical security risk

Due to innovative business models behind ransomware-as-a-service, fundamental increase in reliance on vulnerable information technology (IT) systems by physical process controls and the evolving cyber insurance market means that every industrial organization needs to reassess […]

Bridging the cybersecurity leadership gap

Bridging the cybersecurity leadership gap

Ransomware attacks have skyrocketed in recent years. There is no sign of slowing down despite the increase in spending and risk awareness. Cybersecurity personnel often feel burned-out and relatively ineffective. They are constantly firefighting, and […]

Differences between local and international cybersecurity standards

Differences between local and international cybersecurity standards

The Federal Service for Technical and Export Control (FSTEC) is a difficult topic, but it is essential to explore in order to understand how this strict Russian regulation affects cybersecurity tool manufacturers and system integrators. […]

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES