Archive for the ‘cyber security’ Category

10 Steps to Cyber Security

Steps to Better Security: A Simple Cyber Resilience Guide for Business

Leave a Comment

What Security Engineers Hate About SIEM

SIEM Satisfaction is Mediocre When CISOs, CIOs, CTOs, security engineers, security analysts and security architects were asked to rank the primary capabilities of a traditional SIEM according to how satisfied they were with those capabilities, an interesting picture emerged. The survey results indicated that every primary capability of traditional SIEM solutions, at best, only somewhat […]

Leave a Comment

Cyber security for construction businesses

Building an Effective Cybersecurity Program

Leave a Comment

3 key elements of a strong cybersecurity program

The world relies on technology. So, a strong cybersecurity program is more important than ever. The challenge of achieving good cyber hygiene can be especially acute for small- and medium-sized businesses. This is particularly true for those with fully remote or hybrid work environments. Add to the mix limited resources and limited talent focused on cybersecurity, and […]

Leave a Comment

Critical Infrastructure Attacks Spur Cybersecurity Investment

The attacks on critical industrial systems such as Colonial Pipeline last year pushed industrial cybersecurity to center stage. And with the threat of war between Russia and Ukraine, experts warned nations that a global flare-up of cybersecurity attacks on critical infrastructure could be looming. In late January, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) put critical […]

Leave a Comment

10 Steps to Cyber Security

8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Harden your business against internal and external cybersecurity threats with a single accessible resource.  In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering […]

Leave a Comment

14 CYBER SECURITY PREDICTIONS FOR 2022 AND BEYOND

14 Cyber Security Predictions For 2022 – by Mandiant Blackout Warfare: Attacking The U.S. Electric Power Grid A Revolution In Military Affairs

Leave a Comment

Cyber Security in mergers and acquisitions

Guide to Cybersecurity Due Diligence in M&A Transactions

Leave a Comment

10 Steps to Cyber Security

Cybersecurity Program Development for Business: The Essential Planning Guide

Leave a Comment

Cyber security small business guide

Cybersecurity Program Development for Business: The Essential Planning Guide

Leave a Comment

How can a business ensure the security of their supply chain?

10 best practices to evaluate a supplier’s risk While there are no guarantees that a business can detect a supply chain attack before it happens, there are 10 best practices that a business can consider to help mitigate risk and validate the security of its supply chain. 1. Evaluate the impact each supplier can have […]

Leave a Comment

How Virtualization Helps Secure Connected Cars

Connected cars create opportunities to deliver enhanced customer experiences. At the same time, they also have the potential to provide high cost and revenue benefits. This is true for connected car companies, OEMs, suppliers and insurers (and much, much more). However, car companies haven’t really explored the opportunities to monetize customer data adequately. We can […]

Leave a Comment

Pakistan government approves new cybersecurity policy, cybercrime agency

The Pakistan Ministry of Information Technology has announced that a new cybersecurity policy and accompanying cybersecurity agency has been approved for the South Asian nation. The new policy aims to support both public and private institutions, including national information systems and critical infrastructure, replacing a system whereby government institutions have separate security operations. It comes at […]

Leave a Comment

Cybersecurity can drive business transformation instead of holding it back

A security strategy that doesn’t offer the flexibility for innovation undermines the key competitive driver in a modern environment. So how do organizations bake trust into their security posture to provide the confidence to innovate and grow? To achieve a balance between trust and innovation, businesses must rethink their approach by weaving security into every […]

Leave a Comment

The first step to being cybersmart: Just start somewhere

When company leaders and IT staff begin looking at their options around improving their security and discover hundreds of possible solutions, they can become overwhelmed. However, the best thing they can do is just start somewhere. IT and security specialists can get started by simply identifying the most critical risk areas in their business. Once they’ve taken that […]

Leave a Comment

Arizona governor announces the launch of Command Center to protect state computer systems

The governor of Arizona, Doug Ducey, has announced the launch of a Cyber Command Center to address the thousands of attacks that daily target government computers. The governor of Arizona, Doug Ducey, has launched a Cyber Command Center to repel the huge amount of attacks that every day hit the computer systems of the state. […]

Leave a Comment

New BrakTooth flaws potentially impact millions of Bluetooth-enabled devices

Security flaws in commercial Bluetooth stacks dubbed BrakTooth can be exploited by threat actors to execute arbitrary code and crash the devices via DoS attacks. A set of 16 security flaws in commercial Bluetooth stacks, collectively tracked as BrakTooth, can be exploited by threat actors to execute arbitrary code and crash the devices via DoS attacks. The issues […]

Leave a Comment

DoJ Launches Cybersecurity Fellowship Program as Threats Rise

The U.S. Department of Justice (DoJ) announced the creation of a cybersecurity fellowship program that will train prosecutors and attorneys to handle emerging national cybersecurity threats. Fellows in the three-year Cyber Fellowship program will investigate and prosecute state-sponsored cybersecurity threats, transnational criminal groups, infrastructure and ransomware attacks and the use of cryptocurrency and money laundering to finance […]

Leave a Comment

Samsung can remotely disable their TVs worldwide using TV Block

Samsung says that it can disable any of its Samsung TV sets remotely using TV Block, a feature built into all television products sold worldwide. This was revealed by the South Korean multinational in a press release issued earlier this month in response to the July South African riots that led to large-scale looting, which also impacted Samsung warehouses […]

Leave a Comment

U.S. Taps Amazon, Google, Microsoft, Others to Help Fight Ransomware, Cyber Threats

Creation of the Joint Cyber Defense Collaborative follows high-profile cyberattacks on critical U.S. infrastructure The U.S. government is enlisting the help of tech companies, including Amazon.com Inc., Microsoft Corp. and Google, to bolster the country’s critical infrastructure defenses against cyber threats after a string of high-profile attacks. The Department of Homeland Security, on Thursday, is formally unveiling the initiative called […]

Leave a Comment