U.S. federal regulators are revamping their approach to oil pipeline cybersecurity by telling operators they have newfound latitude so long as they implement continuous monitoring and test their posture. Pipeline cybersecurity became a priority after a 2021 ransomware attack led to gas shortages.
Ransomware operators, crypto miners and initial access brokers are increasingly targeting the same networks for compromise, creating a new set of challenges for defenders. Sophos has brought together three teams of cybersecurity experts to help businesses defend against changing threats.
As the world embraces renewables and green energy, is the energy sector properly learning from past cybersecurity mistakes? Rafael Narezzi, CTO of CF Partners, discusses current industrial cybersecurity shortcomings and the need for the industry to take a more mature and proactive approach.
You can’t rely on technology alone. With over 50% of phishing emails bypassing existing email security every month, it only takes ONE malicious email to steal credentials, inject malware, or scam employees.
With the right education and training, users can routinely report suspicious messages to the SOC....
The ESG Research Report includes a double-blind survey of enterprises – composed of various industry verticals.
The challenges driving change in security operations.
How your peers are changing up prioritizing addressing growing attack surface and threat landscape complexity.
Whether you’re looking at the barrage of increasingly
sophisticated ransomware variants or deeply embedded
corruptions in the software and vendor supply chains,
it’s impossible to ignore the fact that if security is a
game, the game has been changed beyond recognition.
It’s high time to modernize your...
Download and read this IDC Voice of the Analysts report and learn how to:
Reduce and automate functions that are not aligned to analysts’ core mission;
Enable analysts to do what they do best - hunt, detect, and eliminate the bad guys;
Use automation in the right place to handle the high volume of data to...
Most publicly traded security vendors specialize in one technology category, but Palo Alto Networks has built out industry-leading practices around network security, cloud security and security operations. CEO Nikesh Arora discusses this unique path.
Devo has closed its Series F round and notched a $2 billion valuation to incorporate more capabilities into its SOC via acquisition. The company plans to use the $100 million to buy companies that will provide customers with additional intelligence on top of Devo's data for specific use cases.
XDR is quickly becoming a preferred solution for security teams seeking a coordinated, holistic approach to their security operations.
By empowering teams with limitless ingestion, analysis, and protection across the entire organization, Elastic's Limitless XDR offering unifies data types to improve detection,...
The new Expel Quarterly Threat Report provides data on what we’re seeing,
detection opportunities, and resilience recs to help protect your organization.
We’ll dive into the trends in this report, based on incidents the Expel security
operations center (SOC) team identified through investigations into...