Cyberattackers have hit Ukraine's critical infrastructure over 3,000 times since the beginning of the Russian invasion in 2022, according to Ukraine's national incident response team, which warned that such attacks may continue for years even after the fighting on the ground is over.
Forrester evaluates the native platform security capabilities of Infrastructure as a Service (IaaS) providers, shows how they measure up, and helps professionals make the right choice.
In this report, you will learn:
Why Google Cloud was named a Leader in IaaS Platform Native Security
How Google Cloud's native...
As breaches continue to occur, organizations over the years have relied on EDR to address incidents that are not being handled properly by existing defences. However, we cannot rely on EDR capabilities alone. With advanced threats entering your environment, XDR will help you not only to aggregate data but also provide...
The increase in attack vectors and new threats has prompted companies to invest heavily in cybersecurity tools. But CISOs struggle with managing siloed products that do not integrate with each other. Consolidation of security architecture is a priority for CISOs, said Check Point's Itai Greenberg.
Skilled attackers...
Strengthening cybersecurity is the # 1 priority for IT departments and infrastructure decision makers worldwide. A multi-layered 3-2-1-0 data protection strategy provides rapid recovery, protection against cyberthreats, data loss, and local disasters, and designing a proper approach can minimize your risk. Join...
A new strain of Russian operational technology malware could cause electric power disruption in Europe, the Middle East and Asia, Mandiant found. The malware wreaks havoc by interacting with devices such as remote terminal units that are used for electric transmission and distribution operations.
Small electric utilities, wastewater facilities and hospitals struggle with defending their organizations against emerging cyberthreats given their meager resources, U.S. government officials said. Many utilities have failed to adopt cyber best practices despite the available tools and training.
The increase in attack vectors and new threats has prompted companies to invest heavily in cybersecurity tools. But CISOs struggle with managing siloed products that do not integrate with each other. Consolidation of security architecture is a priority for CISOs, said Check Point's Itai Greenberg.
Britain's National Cyber Security Centre said Russian hacktivists have ambitions of becoming a larger threat to Western critical infrastructure. "Disclosing this threat is not something we do lightly," said U.K. Cabinet Office Secretary of State Oliver Dowden.
The Biden administration is probing how highly classified military and intelligence documents detailing national security secrets came to be leaked via Discord servers and social media. Experts say the leaked documents appear to be genuine, although some have been crudely doctored.
Lawmakers urged Director Jen Easterly to devise metrics that quantify how effectively the Cybersecurity and Infrastructure Security Agency uses federal money to cut cyber risk. Rep. Dave Joyce wants CISA to more precisely measure the return on taxpayer spending given the agency's rising budget.
Utility companies have increasingly refrained from purchasing large power transformers from China given greater awareness of the security risks. Lawmakers sparred with the Energy Department's cybersecurity leader over how much of the electric grid contains components manufactured in China.
Europe's cybersecurity agency predicts hackers will take advantage of the growing overlap between information and operational technologies in the transport sector and disrupt OT processes in a targeted attack. Ransomware will become a tool wielded for political and financial motivations, says ENISA.
The top U.S. cybersecurity agency says it is testing how to scan critical infrastructure organizations to detect vulnerabilities ransomware hackers can exploit in a bid to have the flaws patched before extortionists also discover them. The Ransomware Vulnerability Warning Pilot started on Jan. 30.
The U.K. government says a new national agency will work with the private sector to stymie national security threats including foreign hackers after British intellectual property. In an update to British foreign policy, Prime Minister Rishi Sunak vowed to "push back" against China.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.