As companies look for new ways to drive internal efficiencies and improve workflows for their staff, many are turning to digital transformation. However, with any advancement in technology or process, we inevitably see an increase in threat surface and attack vectors. What does digital transformation truly mean to...
Hackers stole at least $920,000 from Russia's PIR Bank after they successfully compromised an outdated, unsupported Cisco router at a bank branch office and used it to tunnel into the bank's local network, reports incident response firm Group-IB.
An advisory group that includes a diverse array of members will spend the coming months devising detailed guidance on how to address the "shared responsibility" of medical device cybersecurity, explains Greg Garcia, who is leading the initiative.
The growth of IoT means traditional methods of security are inadequate, says Steve Rog of ForeScout Technologies, who calls for improvements in security hygiene.
The explosive growth of IP networking has let a genie out of the bottle. The more an organization or nation is connected to the internet, the more vulnerable it becomes. The challenge is finding the right balance between "can" and "should" - the fact that we can connect every person, server, app, and cloud vs. the...
Deployed at the network layer, segmentation was first developed to improve network performance. But as cybersecurity experts have realized that a "perimeter only" approach to security is not working, it has become increasingly clear the micro-segmentation is foundational to data center and cloud security. ...
What are hot cybersecurity topics in Scotland? The "International Conference on Big Data in Cyber Security" in Edinburgh focused on everything from securing the internet of things the rise of CEO fraud to the origins of "cyber" and how to conduct digital forensic investigations on cloud servers.
The proliferation of apps, wearables, sensors and other connected devices that provide access to real time health and wellness data have the potential to revolutionize the provision of healthcare. In addition, the healthcare industry is increasingly tapping into the power of deep learning to analyze health data sets...
Organizations are increasingly turning to devices and the cloud to foster better collaboration and access to essential data. But as they do so, "the number one blocker for enabling digital transformation is security," warns BlackBerry's Florian Bienvenu.
Explosive growth in network scale and complexity demands a next generation Public Key Infrastructure (PKI) management platform. Ted Shorter of CSS says security leaders must prepare now to take full advantage of next-gen PKI solutions.
The Department of Homeland Security has issued two more alerts about cyber vulnerabilities in certain medical devices. The stream of recent advisories is helping to draw more attention to the importance of addressing device security. But healthcare providers face the challenge of tracking and mitigating all risks.
Explosive growth in network scale and complexity demands a next generation Public Key Infrastructure (PKI) management platform. Expansive enterprise digital certificate and PKI usage, coupled with the advent of massive Internet of Things (IoT) device introductions, requires automation for secure and scalable...
At least 500,000 routers, mostly located in Ukraine, have been infected with "VPN Filter" malware that experts believe is a prelude to a massive cyberattack. But the FBI has sinkholed the control domain for the router botnet, which should help contain the potential damage.
In the great Internet of Things gold rush, early adopters have largely left behind identity and access management. As a result, many organizations are scrambling to deal with the consequences as the IoT is vulnerable to hacks that can give malicious actors control over connected devices. Recent DDoS attacks and...
Businesses spend billions each year on identity and access management, but almost all of this money is spent on protecting the digital identities of humans - usernames and passwords.
On the other hand, businesses spend almost nothing on protecting machine identities, even though our entire digital economy hinges...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.