: Just when IT and OT professionals were feeling a little more comfortable in preventing and tackling ransomware/malware attacks, now they have something new to worry about—and potentially just as insidious—the Log4j vulnerability.
Microsoft Active Network Directory Services makes it easy for system admins to make changes to fluid networks--but if not managed properly, leaves an open door for malicious actors.
The FDA has reorganized the agency’s information technology (IT), data management and cybersecurity functions into the new Office of Digital Transformation (ODT), which has been realigned to report directly to the FDA commissioner.
Recently, a relatively new source of cybersecurity help comes from cyber insurance providers. Cyber insurance can help save a company from financial ruin, besides helping with a defense plan
While Black Matter, a new ransomware group, promised not to target critical infrastructure, those purchasing the RaaS don’t necessarily follow that rule
Technology companies are employing AI/ML techniques to deter nefarious actors, but users still need to exercise common sense in defending their industrial control systems.
Cybersecurity may seem only for enterprise systems and critical infrastructure, but at the control system level there are too many gaps in the food and beverage industry.
Once a hacker connects via RDP to any computing system, unless operators take immediate action, the hacker can use this connection to log in at any time in the future, extort money, install ransomware on the computer, and/or sell the connection login/password and other data on the dark web, making an unprotected system available to anyone who wants to purchase the information.
The cryptography working group within the Internet Engineering Task Force (IETF) standards organization has chosen the Endress+Hauser-developed CPace protocol as a recommended method for use in internet standards.