Remove CSO Remove Internet Remove Technology
article thumbnail

LW ROUNDTABLE: Wrist slap or cultural shift? SEC fines cyber firms for disclosure violations

The Last Watchdog

Related: Technology and justice systems The U.S. Avaya Holdings , Check Point Software Technologies , and Mimecast Limited each minimized or obscured the extent of security breaches linked to the SolarWinds Orion hack, impacting investor trust and highlighting the critical importance of clear, truthful communication.

CISO 263
article thumbnail

LW ROUNDTABLE: CrowdStrike outage reveals long road ahead to achieve digital resiliency

The Last Watchdog

Last week, CrowdStrike, one of the cybersecurity industry’s most reputable solution providers, inadvertently caused more disruption across the Internet than all the threat actors active online at the time. Explore alternative operational enablers, both technological and non-technological, and evaluate their costs and investment thresholds.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is physical security? How to keep your facilities and devices safe from on-site attackers

CSO Magazine

Get the latest from CSO by signing up for our newsletters. ]. All the firewalls in the world can’t help you if an attacker removes your storage media from the storage room. Learn what you need to know about defending critical infrastructure. |

article thumbnail

GUEST ESSAY: Leveraging ‘zero trust’ and ‘remote access’ strategies to mitigate ransomware risks

The Last Watchdog

As an enterprise security team, you could restrict internet access at your egress points, but this doesn’t do much when the workforce is remote. In short, anything accessible from the internet should be given extra attention. This disables peer-to-peer access, enabling internet-only access. Food for thought, eh!

article thumbnail

BrandPost: The state of operational technology and cybersecurity

CSO Magazine

Today, the convergence of operational technology (OT) and IT networks is accelerating because organizations can use the data collected by physical equipment and Industrial Internet of Things (IIoT) devices to identify issues and increase efficiency.

article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »

CSO 59
article thumbnail

Episode 250: Window Snyder of Thistle on Making IoT Security Easy

The Security Ledger

In this episode of the podcast, I speak with Window Snyder, the founder and CEO of Thistle Technologies about the (many) security challenges facing Internet of Things (IoT) devices and her idea for making things better: Thistle’s platform for secure development and deployment of IoT devices. Read the whole entry. »

IoT 98