Cyber criminals are taking advantage of the
economic uncertainty plaguing the Oil & Gas industry.
Download this summary to learn more about the true cost of cyber dangers facing
the industry and how control your third party risk.
Quickly and Easily Deploy a Comprehensive Contact Tracing Solution
Contact tracing is a critical tool for slowing the spread of communicable diseases like the Covid-19 coronavirus, by helping admins identify the individuals an infected person has been in contact with to contain widespread transmission. State and...
After the occupation of the U.S. Capitol by pro-Trump rioters Wednesday, an emergency response plan to ensure federal computers were locked down apparently was not activated, some experts say. As a result, federal security teams are likely scrambling to detect and repair any damage done.
Cybersecurity has long been a
challenge across industries. Now that
most organizations are firmly in the age
of digital transformation, protecting
against threats is increasingly complex
but also crucial to shield against
financial and reputational damage.
With hybrid infrastructures accommodating
modern and...
The massive pro-Trump demonstrations that saw large crowds riot and then occupy the U.S. Capitol building in Washington pose a significant potential cybersecurity threat as protesters appear to have gained access to at least one lawmaker's office, along with computer systems and other devices, some experts say.
This report details seven case studies of attacks that were intercepted and neutralized by cyber defense AI, including insider threat, ransomware, and IoT attacks.
While all threat scenarios were distinct, some fast-moving and others slow and stealthy, in all cases the subtle indicators of suspicious activity were...
To protect today's dynamic workforce, security teams must be equipped to discern when and how a trusted account has been leveraged for nefarious purposes. This requires more than just an understanding of 'good' vs 'bad' - it requires an 'immune system' approach to security that is not only adaptive, but also grounded...
The FBI is warning of a rise in "swatting attacks," which see hackers use compromised email accounts to access poorly-secured home smart devices that are equipped with cameras and voice capabilities to make hoax calls to emergency services.
Identity management will be at the forefront of securing remote work in the coming year. Jason Bohrer, new leader of the Secure Technology Alliance and the U.S. Payments Forum, describes key initiatives as he steps into this role.
In the wake of the SolarWinds breach, NIST's Ron Ross has turned his attention to systems security engineering - and the reality that the adversaries are exploiting it to their advantage better than the defenders are. This disparity, Ross says, has to change.
The Zero Trust security model created by Forrester has become a mainstay of security approaches. But traditional Zero Trust controls largely overlook unmanaged and IoT devices, leaving the enterprise at risk.
Read this white paper and learn:
How existing Zero Trust security tools are not designed for unmanaged...
A hacking group behind an Android spyware variant has recently added fresh capabilities that include the ability to snoop on private chats on Skype, Instagram and WhatsApp, according to ReversingLabs. This APT group, believed to be tied to Iran, has recently been sanctioned by the U.S. Treasury Department.
You’re securing more endpoints than ever across the largest attack surface ever. Enter: IoT devices and the risks they bring. But they also bring new business benefits. Mitchell Bezzina of Palo Alto Networks explores risks, benefits and new steps to ensure IoT security.
In this one-pager Bezzina...
President Donald Trump on Friday signed into law the Internet of Things Cybersecurity Improvement Act of 2020, the first U.S. federal law addressing IoT security. The act requires federal agencies to only procure devices that meet minimum cybersecurity standards.
A critical component within millions of consumer and enterprise IoT devices has dangerous software flaws. New research from Forescout Technologies into open-source TCP-IP stacks shows millions of devices from 150 vendors are likely vulnerable.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.