A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
Assessing the priorities, assets and technology strategies that make cybersecurity a journey, not a destination.
A recent report from OT cybersecurity solutions provider Cyolo discussed several factor…
Using data to break down silos, reverse engineer outcomes, and identify emerging threats like WormGPT.
According to recent report from Trellix, 31 percent of CISOs identified a lack of buy-in and use …
Embracing the 'not if, but when' mindset.
Cybersecurity solutions provider Trellix recently unveiled their 2023 Voice of the CISO report. Among other topics, it explored the top 5 challenges cited by …
How a global manufacturer learned from past attacks, and the most critical benefit of security tools.
IBM research shows a 33 percent increase in cyberattacks against manufacturing companies between 2…
"It just boggles the mind that things that are so important to how our world works are so shockingly unprotected."
According to ABI Research, less than five percent of critical industrial infrastructu…
Netskope Threat Labs, a leading provider of threat analysis and cyber defense strategies for cloud-based vulnerabilities, recently published their most recent Threat Labs Report. Findings specific to…
The latest tools and technology needed to create and defend your data fortress.
A couple of recent ransomware attacks offer perspective on evolving cybersecurity concerns within the industrial sector
G…
Vital defensive tactics that go beyond the attacker.
The sensor and communication technology associated with remote monitoring has proven to be both a time-saving and productivity enhancing tool, as w…
How hackers are targeting ERP systems and automating more attacks.
Adding to the data supporting a surge in cyber-criminal activity is the FBI Crime Compliant Center’s most recent Internet Crime Repor…
How increasingly complex attacks might demand taking humans out of the cybersecurity loop.
First published in 2014, the National Institute of Standards and Technology (NIST) recently announced updates…
Credential harvesting, backdoor attacks and staying on top of who or what is logging into your networks.
While more connection points can create more security soft spots for industrial enterprises, it…
Inside the resurgence of ransomware attacks and the rise of billion-dollar "unicorn" hacker gangs.
Believe it or not, there was a time in recent history when we actually experienced a reprieve in rans…
Strategies for breaking down IT silos in learning how people, devices and networks can be attacked.
Providing a significant assist to transparency efforts in cybersecurity is the Strengthening America…
Why cybersecurity is all about ROI, and other "unsexy" stuff on which to build your defenses.
In previous episodes of Security Breach, we’ve discussed penetration testing, ethical hackers, cataloging …
Supply chain management has always been a priority for the industrial sector, but over the last three-plus years, its importance has been elevated for numerous reasons. The problem, from a cybersecur…
One of the biggest challenges surrounding industrial cybersecurity is the size of the attack surface that must be monitored, assessed, and constantly updated in order to evolve with the rising number…
The industrial sector continues to be a hot target for hackers. Ransomware, malware and phishing attacks all continue to escalate in both frequency and potency. The on-going mixture of new technologi…
Perhaps the only topic that solicits a uniform response is when my guests are asked about the most important part of a cybersecurity plan. The common mantra is that there has to be buy-in throughout …
As we continue to see an increase in attacks targeting the ICS, it’s about more than just the industrial sector creating cyber defense plans, cataloging connection points and shoring up vulnerabiliti…
The latest high-profile hack of Dole Foods reinforces the need to upgrade operational technology security, and not just for the manufacturer. The distributors, logistics providers, retailers and end-…