Of late, several companies have taken hits on their worldwide IT and Web based systems. Perhaps the most recent, Canon, suffered a global ransomware attack, taking down many Canon websites and systems - also with a threat of making their private business data public. But can these IT/enterprise attacks threaten and/or damage OT systems? And what can they do to food and beverage products? Make them unsafe by altering a critical kill step or omitting preservatives? What else? I asked Barak Pereleman, VP of OT Security at Tenable, what attack vectors may pose danger to OT-based systems.
Three industries were targeted the most by cyberattacks— transportation, where state-sponsored threat actors seek to disrupt the logistical and supply capability of rivals, and banking and legal, which are industries rich with sensitive information.
November 25, 2019
Mimecast Ltd., Lexington, Mass., released its quarterly report, “Threat Intelligence Report: Risk and Resilience Insights,” which provides technical analysis and observations of evolving threats from the Mimecast Threat Center from July to September.
PepsiCo faced a dilemma about three years ago when its access control software provider announced “end of life” for its legacy security software, potentially leaving more than 300 PepsiCo locations in the lurch for an access control system. What to do?
A recent statement from U.S. Department of Homeland Security’s Cyber+Infrastructure’s (CISA) National Cyber Awareness System noted that the Australian Cyber Security Centre (ACSC) has updated its “Essential Eight Maturity Model.” Though all this sounds like alphabet soup or bureaucratic gobble-de-gook, the Maturity Model consists of eight important mitigation strategies you should be employing to protect your computing systems.
It’s ironic that the Jeff Bezos, Amazon chief executive, who heads up one of the most cyber-secure cloud architectures in the world, had his own very private data hacked and used against him. But his sloppiness about personal security provides a warning message for us all. That is, we can build the most secure, impossible-to-hack network systems, but they can’t protect us from our own stupidity—sharing very personal data over systems that aren’t so private.