article thumbnail

GUEST ESSAY: Here’s why castle-wall defenses utterly fail at stopping deceptive adversaries

The Last Watchdog

There are several methods of active defense that companies can utilize to safeguard their networks, and it’s time for CISOs to start picking. Traditional network security solutions, such as firewalls, are not effective at detecting and stopping lateral attack movement – and that’s where the real damage is done.

article thumbnail

How Cybersecurity Delays Critical Infrastructure Modernization

Security Boulevard

Cybersecurity concerns relating to the protection of data are having a significant impact on the modernization (or lack thereof) of critical and public utility infrastructure, with many utility companies failing to adopt new tools and technology available to them.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cisco Secure Endpoint goes Pro

Cisco Security

And as hybrid work becomes the new normal, knowledge workers and their endpoints are increasingly exposed to threats beyond the reach of legacy corporate network security. Compounding this is the rising cost of a security breach, increasing almost 10% between 2020 and 2021, from $3.86 million to $4.24

article thumbnail

Every month should be Cybersecurity Awareness Month!

CyberSecurity Insiders

This includes many aspects of cybersecurity, such as user training, endpoint security, network security, vulnerability management, and detection and response to incidents. Industries such as healthcare and energy and utilities are susceptible and arguably the most vulnerable to ransomware or other cybersecurity incidents.

article thumbnail

Colonial Pipeline attack spotlights risks of geographically dispersed networks in an industry that is ‘far behind’

SC Magazine

” “These are very large networks covering extensive distances but they are typically ‘flat’ from a network segmentation standpoint,” Cusimano added. “This means that once someone gains access to the SCADA network they have access to every device on the network.”. Fortress Information Security.

Risk 105
article thumbnail

Adoption of Secure Cloud Services in Critical Infrastructure

CyberSecurity Insiders

Security controls, not just at the perimeter, but spread across ICS networks. Securing ICS networks doesn’t just involve perimeter security, but a whole range of security controls that the security program must implement, including lateral segmentation, possibly micro-segmentation, device level security, and device access control.

IoT 134
article thumbnail

Microsoft Targets Critical Outlook Zero-Day Flaw

eSecurity Planet

Outlook NTLM exploit “Additionally, Microsoft confirmed that the flaw had been exploited as a zero day as part of limited attacks against government, transportation, energy, and military targets organizations in Europe by a Russia-based threat actor,” Narang said.