Remove CSO Remove Cyber threats Remove Manufacturing
article thumbnail

Australian electric grid vulnerable to Cyber Attacks via Solar Panels

CyberSecurity Insiders

Because of some vulnerabilities in solar panels and smart devices, security experts state that the Australian Electricity Grid is becoming super vulnerable to cyber attacks. And unless these devices are secure enough, their usage can invite more troubles,” said Alistair MacGibbon, the CSO of CyberCX.

article thumbnail

Ransomware is top attack vector on critical infrastructure

CSO Magazine

Nearly two-thirds of those attacks (65%), were aimed at the manufacturing sector, the company revealed in its annual review of cyber threats facing industrial organizations released Wednesday. You can combine all the other sectors together and not get to where manufacturing is getting hit," Dragos CEO Robert M.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: CISA Calls for Stamping Out Buffer Overflow Vulnerabilities, as Europol Tells Banks To Prep For Quantum Threat

Security Boulevard

CISA and FBI urge manufacturers to use proven prevention methods and mitigations to eliminate this class of defect while urging software customers to demand secure products from manufacturers that include these preventions, the agencies wrote in a joint fact sheet. Kirsten Gillibrand (D-N.Y.)

Banking 64
article thumbnail

2022 Cybersecurity predictions

CyberSecurity Insiders

While in past years, InfoSec was previously the focus and CISOs were the norm – we’re moving to a new cybersecurity world order that expands the role of the CISO to a CSO (Chief Security Officer). Manufacturing is a prime area for disruption with the increase in the number of IoT devices during the pandemic.

article thumbnail

BrandPost: Is Your Business Secure Enough to Work at the Edge?

CSO Magazine

Chances are you’re living in a hybrid world with everything from how you work to how you shop to how your business operates its manufacturing environments. Cyber threats run rampant in today’s digital world. All of this is made possible because of edge computing.

article thumbnail

Walking the Walk: How Tenable Embraces Its “Secure by Design” Pledge to CISA

Security Boulevard

Our commitment is to ensure that our platform remains robust against evolving threats and provides the best possible security for our customers. This shift represents a significant enhancement of our password security practices, ensuring that our platform remains resilient against evolving cyber threats.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

VoIP phishing and impersonation also victimized millions of corporate employees across the world , contributing to an even greater cyber threat. Cloud security success and choosing the right investments is all about having a clear understanding of threat types and their resulting damages.