Which is the Threat landscape for the ICS sector in 2020?
The Kaspersky ICS CERT published a report that provided details about the threat landscape for computers in the ICS engineering and integration sector in 2020. Kaspersky ICS CERT published a…
Are Encrypted Communication Apps used for Crime Operations?
By Nicole Allen, Marketing Executive, SaltDNA. Police have successfully infiltrated some of the biggest criminal markets on the dark web – but it’s pushing criminals into using encrypted apps which…
Analytics & Security Insight On 2021 And Beyond
Predictions for the Future of the Security Space By Billy Spears, Chief Information Security Officer, Alteryx 2020 has been a year unlike any other, with unforeseen challenges creating hurdles for…
How Next-Gen Identity Governance and Administration (IGA) Fits in with Your Hybrid IT Strategy
By Thomas Müller-Martin, Global Partner Technical Lead, Omada More and more organizations are using a hybrid IT environment that combines both on-premises and cloud-based applications. The rise of remote work,…
Moving to Active Defense: What It Means, How It Works and What You Can Do Now
By Ofer Israeli, CEO and founder, Illusive Networks Despite the myriad cybersecurity solutions out there, breaches, attacks and exploitations continue. The old approach isn’t working; cybersecurity teams need to move…
Are Your Organization’s Critical Assets Five Steps or Fewer from A Cyber Attacker?
By Gus Evangelakos, Director Field Engineering, XM Cyber Cybersecurity is an asymmetric battle — and one in which attackers hold an unfair advantage. Adversaries maintain the initiative and can attack…
The fire in the OVH datacenter also impacted APTs and cybercrime groups
The fire at the OVH datacenter in Strasbourg also impacted the command and control infrastructure used by several nation-state APT groups and cybercrime gangs. OVH, one of the largest hosting…
Hackers stole data from Norway parliament exploiting Microsoft Exchange flaws
Norway parliament, the Storting, has suffered a new cyberattack, hackers stole data by exploiting recently disclosed Microsoft Exchange vulnerabilities. Norway ‘s parliament, the Storting, was hit by a new cyberattack,…
CMMC – Lessons Learned to Date
By Carter Schoenberg, Vice President of Cybersecurity at SoundWay Consulting. In the January issue of Cyber Defense Magazine, my first article provided an introduction to the Cybersecurity Maturity Model Certification…
The Best Network Protection: Go Deep or Go Broad?
Combining Breadth and Depth Brings Full Protection By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors and practitioners have wrestled with choices between…
Apple fixes CVE-2021-1844 RCE that affects iOS, macOS, watchOS, and Safari
Apple released out-of-band patches to address a remote code execution, tracked as CVE-2021-1844, that affect iOS, macOS, watchOS, and Safari web browser. Apple has released out-of-band security patches to address…
3 SaaS Backup Rules to Keep Your Data Safer in 2021
By Dmitry Dontov, CEO and Chief Architect of Spin Technology In the wake of the global pandemic, organizations of all types and sizes have pivoted to cloud resources to accommodate…