The broadcast of the Football World Cup 2022 qualifier game between Wales and Ukraine on Sunday was interrupted in Ukraine by a cyberattack that targeted OLL.TV, a Ukrainian online broadcaster. Traffic was rerouted to a Russian propaganda-based channel, the SSSCIP says.
The U.S. is on "borrowed time" for a major cyberattack that could potentially seriously disrupt critical infrastructure, but the nation can secure its systems and resources to avoid such cybersecurity disasters, says Rep. Eric Swalwell, D-California.
Abnormal Security is out with new financial crimes research, and it shows that traditional business email compromise is evolving into new forms of financial supply chain compromise. Crane Hassold shares insights on the crimes and how best to detect, deter and respond to them.
Cyberwarfare has emerged as the bridge between espionage and kinetic conflict. "It's here," says Chase Cunningham of Ericom Software. He discusses how enterprise cybersecurity leaders should now think more deeply about their adversaries' motivations and capabilities.
A cyberattack on the municipality of Palermo, which began on Thursday, reportedly continues to cripple the southern Italian city on Monday. The attack caused the municipality's systems and dependent services to be shut down and isolated, and local citizens and tourists alike have been affected.
Far too many companies think that backups and cyber insurance will see them through a cybersecurity breach, says Mark Sangster of Adlumin. He shares his advice to enterprise security leaders who want to treat cybersecurity as the business risk it is.
A new, as yet unnamed Airbus organization will address potential cyberthreats beginning July 1, amid the increasing digitalization and interconnectedness of the company's products and systems. The new firm will house all of Airbus' cybersecurity services and make key investments in the space.
From cloud migration to application development, cybersecurity is in the middle of an "epochal change," says Jeff Hudson, CEO of Venafi. He wants enterprise security leaders to envision the possibilities when security and development are in sync.
The Cyber Threat Alliance just celebrated its fifth birthday, and President and CEO J. Michael Daniel says the membership and information sharing both are growing at an impressive pace. He discusses the surge in ransomware and how organizations should respond.
Billions of dollars have already been lost in crypto exchanges, and some of the some losses have been due to "basic" security failures, including third parties not implementing common controls, says Troy Leach, security executive in residence at Cloud Security Alliance.
There's good news and bad news regarding the current state of COVID-19 and its impact, says Regina Phelps, founder of Emergency Management and Safety Solutions Inc. "The rest of the world has moved on, she says, "but … we have a lot more infection and the opportunity for new variants."
The new Expel Quarterly Threat Report provides even more data on what we’re seeing, detection opportunities, and resilience recs to help protect your organization — now on a quarterly basis.
When contracting for modern MDR services, Lyndon Brown of Pondurance advises prospective customers to ask about more than the managed service and detection. He says they should ask tough questions about response. Brown shares his insights and strategies.
Nozomi Networks Sales Director Nycholas Szucko discusses the pursuit of cybersecurity education for OT and how digital transformation has brought a huge challenge to the industry. He says we cannot protect what we cannot see. The ideal approach is always to start with the basics, ensuring visibility and taking an...
The OT market is growing. As a result, the industry is facing a lack of trained professionals with the techniques to perform this function. Therefore, companies need to find a way to attract and train employees to fill this space, says Andre Gomes, product manager at Nexa Resources.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.