Please turn on your JavaScript for this page to function normally.

critical infrastructure

zero
Zero trust isn’t just for IT, it can also protect targeted critical infrastructure

Gartner predicts that by 2025 cyber attackers will have weaponized OT environments to successfully harm or kill humans. Not only is a solution to secure OT assets imperative, …

Log4j
The impact of the Log4j vulnerability on OT networks

Operational Technology (OT) networks are at risk from the recently-announced Apache Log4j (CVE-2021-44228) vulnerability. On the surface, it is not clear why this should be. …

EU
Europe’s quantum communication plans: Defending against state-sponsored cyber attacks

State-sponsored cyberattacks are on the rise and are a significant part of the future of warfare. Why would a nation send humans to a frontline when it can take out the …

Code
How to protect air-gapped networks from malicious frameworks

ESET researchers present their analysis of all malicious frameworks used to attack air-gapped networks known to date. An air-gapped network is one that is physically isolated …

train
Railway cyber risk management: Raising awareness on relevant threats

ENISA has announced the release of its report – Railway Cybersecurity – Good Practices in Cyber Risk Management for railway organizations. European railway undertakings …

ransomware
How to combat ransomware with visibility

In the first half of 2021, average ransomware demands surged by 518%, while payments climbed by 82%. There has been a growing number of attacks in healthcare, with 560 …

military
Defense contractors are highly susceptible to ransomware attacks

Twenty percent of America’s largest 100 defense contractors are highly susceptible to a ransomware attack, according to a research from Black Kite. Several critical …

industry
Industrial cybersecurity market to reach $22.3 billion by 2026

The global market for industrial cybersecurity estimated at $15.2 billion in the year 2020, is projected to reach a revised size of $22.3 billion by 2026, growing at a CAGR of …

cloud money
Cloud adoption growing steadily, but cost and regulatory challenges remain

O’Reilly announced the findings of a survey report which explores the latest trends in cloud, microservices, distributed application development, and other critical …

industrial
Unseen gatekeepers: Industrial software providers’ role securing global infrastructure

National infrastructure in almost every Western country has come under attack by threat actors in the last few years. These attacks have grabbed the attention of businesses, …

industry
Three OT security lessons learned from 2021’s biggest cyber incidents

What do an oil pipeline, a water treatment plant, and a railway system have in common? They each rely on operational technology (OT) environments, and they were all victims of …

ransomware
Ransomware: How bad is it going to get?

Ransomware started out with attackers encrypting individual users’ files, demanding a few hundred dollars, and giving the victim a key to unlock their files once they paid up. …

Don't miss

Cybersecurity news