Search
Close this search box.

Threats & Vulnerabilities

How Conti ransomware took down operational technology

How Conti ransomware took down operational technology

Ransomware has taken the world by storm, and informational technology (IT) is not the only technology affected. Operational technology (OT), which is increasingly blending with IT, is also susceptible to ransomware tactics, techniques and procedures […]

Courtesy of CFE Media and Technology

Cybersecurity tactics to defend your workforce

As an organization’s security awareness grows, it’s important to know what cybersecurity tactics to communicate to the workforce during these unprecedented times. As security professionals, it is important to keep the communications calm, simple and […]

As threat increases, college cybersecurity programs are more in demand

Researchers show they can steal data during homomorphic encryption

Homomorphic encryption is considered a next generation data security technology; but researchers have identified a vulnerability that allows hackers to steal data—even as it is being encrypted. “We weren’t able to crack homomorphic encryption using […]

How Conti ransomware took down operational technology

How Conti ransomware took down operational technology

Ransomware has taken the world by storm, and informational technology (IT) is not the only technology affected. Operational technology (OT), which is increasingly blending with IT, is also susceptible to ransomware tactics, techniques and procedures […]

Courtesy of CFE Media and Technology

Cybersecurity tactics to defend your workforce

As an organization’s security awareness grows, it’s important to know what cybersecurity tactics to communicate to the workforce during these unprecedented times. As security professionals, it is important to keep the communications calm, simple and […]

As threat increases, college cybersecurity programs are more in demand

Researchers show they can steal data during homomorphic encryption

Homomorphic encryption is considered a next generation data security technology; but researchers have identified a vulnerability that allows hackers to steal data—even as it is being encrypted. “We weren’t able to crack homomorphic encryption using […]

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES