What if the world had access to memory-safe hardware for both IT and operational technology environments that could outright block many types of vulnerabilities from being exploited as well as make code safer to run on legacy systems? Enter the U.K.'s Digital Security by Design initiative.
The U.S. Cybersecurity and Infrastructure Security Agency apparently had a good reason to urge federal agencies to reset vulnerable Ivanti VPN devices: Hackers breached two gateways used by CISA, forcing the agency to yank them offline. The agency "immediately took offline" the affected VPNs.
The European Parliament and the council of direct European national governments reached a political agreement Tuesday on a proposal that seeks to improve trading bloc cybersecurity. The Cyber Solidary Act will create a "cybersecurity shield" consisting of cross-border security operations centers.
When trying to build Cyber Resilience, an organisation is challenged by an ever-changing cyber threat landscape.
Operating at a fast pace and innovating more, means greater chances of risk and vulnerabilities.
In this webinar, we will delve into how Australian enterprises can proactively manage tech and cyber...
In the latest "Proof of Concept," Jeff Brown, CISO for the state of Connecticut, and Lester Godsey, CISO for Maricopa County, Arizona, join ISMG editors to discuss AI-related threats to election security, safeguarding against cyber and physical threats and coordinating efforts for complete security.
Building a security-led culture is a growing priority amongst the majority of C-suite and security leaders.
Join Dashlane's CPO & CTO, alongside ISMG's Senior VP of Editorial Tom Field, for a lively fireside chat on why security culture starts at the top and how C-suite leadership can set the tone for a strong,...
When a security incident occurs, it often results in a host of unexpected costs for the impacted organization. Those expenses may include the cost to hire a third-party digital forensics and incident response (DFIR) firm, the cost to remediate the incident, and the cost of new cybersecurity protections. But the true...
Join our webinar for an insightful exploration of the evolving landscape of secure access service edge (SASE) and discover our top 5 predictions for this year.
Our cybersecurity experts will:
Analyze the current market, upcoming trends, emerging technologies, and industry shifts to provide you with valuable...
In the ever-evolving landscape of digital transformation, the convergence of Information Technology (IT) and Operational Technology (OT) emerges as a pivotal paradigm shift. Understanding the interconnected nature of these domains is not just a technical requirement but a strategic imperative for businesses seeking to...
Any company with industrial assets faces elevated cybersecurity risks from their operational technology (OT) environments. Although many CISOs have not been responsible for or prioritized OT in the past, they should examine their strategic goals of vendor consolidation and the convergence of their information...
75% of OT organizations reported at least one intrusion in the last year, and nearly 33% of respondents reported being victims of a ransomware attack. In addition, intrusions from malware and phishing increased 12% and 9%, respectively. In short, OT security is under attack.
This report is based on data from an...
Security experts told ISMG they were concerned Microsoft could suffer future cyberattacks and threats to its customers after a Russian state hacking group managed to evade detection for several weeks while targeting accounts associated with the company’s top executives.
Vulnerability Management is becoming more difficult than ever.
As the attack surface has grown, the security industry has become obsessed with detecting every possible vulnerability. Our ability to address these vulnerabilities hasn’t kept pace with the millions of vulnerabilities from dozens of sources found in...
The European Union adopted regulations on cyber hygiene intended to beef up cybersecurity at EU government agencies amid concerns that trading bloc institutions have failed to keep pace with mounting digital threats. European agencies lack "cyber preparedness commensurate with the threat."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.