This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyberrisk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. Read the whole entry. »
When data breaches escalate, cyber-attacks grow more sophisticated, nation states ramp up their digital warfare, and regulations tighten the noose, staying ahead isnt just an optionits your only line of defence. For CISOs and cyberrisk owners, this isnt just a riskits a gamble no one can afford to take.
Related Stories Spotlight: How Secrets Sprawl Undermines Software Supply Chain Security Episode 227: What’s Fueling CyberAttacks on Agriculture ? Tomislav tells us why issues related to Log4j won’t be going away anytime soon and how organizations must adapt to deal with the risk it poses. Read the whole entry. »
» Related Stories Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec Episode 159: Deep Fakes and Election (in)Security with ZeroFOX Spotlight Podcast: Rethinking Your Third Party CyberRisk Strategy. If you believe the headlines, the first known disruptive cyberattack against the U.S.
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyberrisks to OT environments. Read the whole entry. »
InfoSec professionals tend to describe the benefits of a strong cybersecurity program with technical jargon and acronyms. Having been on both sides of the equation as the infosec executive and the enterprise leader, I can confidently say the key is to speak the language of the executive team and board. Believe me – I’ve been there !
But technological advancement inherently results in greater cyberrisk, and today’s OT systems are more vulnerable than ever. . As threat actors continue to target critical infrastructure and industrial assets, we have seen ICS cyber-attacks increase in frequency and sophistication.
Related Stories Episode 162: Have We missed Electric Grid CyberAttacks for Years? Also: Breaking Bad Security Habits Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec Spotlight Podcast: Rethinking Your Third Party CyberRisk Strategy.
From Solar Winds to Colonial Pipeline, we’ve seen that the consequences of a ransomware attack don’t just affect the victimized organization – they can have trickle-down effects that impact whole communities, industries and even nations. I truly believe that your people are your first line of defense.
Infosec teams may have a false sense of security when critical servers are equipped with EDR technology and redundant logging. However, in this attack, after encrypting hosts and exfiltrating data, the attacker sent a Microsoft Teams message from the compromised domain admin account, containing an Onion link for the ransom demand.
Infosec teams may have a false sense of security when critical servers are equipped with EDR technology and redundant logging. However, in this attack, after encrypting hosts and exfiltrating data, the attacker sent a Microsoft Teams message from the compromised domain admin account, containing an Onion link for the ransom demand.
While the world transitions out of the pandemic, cyber adversaries have continued to take advantage of the chaos – cyberattacks have skyrocketed and are only becoming more frequent, destructive, and sophisticated. Ransomware – the hacker’s current cyber weapon of choice.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content