Generative Data Intelligence

Tag: Critical Infrastructure

Cyberinsurance: The value from an incident response lens

Cyberinsurance is not new to the scene, and an increasing number of organizations are accepting its critical role in safeguarding them against costly cybersecurity...

Implementing Digital Transformation Without Stressing The Cyber Security Team

Cyber-attacks are a reality for every organization because of the increasing reliance on digital systems, application and processes. The damage from a cyber-attack...

Mysterious New Ransomware Targets Industrial Control Systems

Only a few times in the history of hacking has a piece of malicious code been spotted attempting to meddle directly with industrial control...

Cybersecurity executive changes

February 4, 2020 Yassir Abousselham was named Splunk’s new Chief Information Security Office. Previously, Abousselham was CISO at Okta. In his new...

Report ties Ekans/Snake ransomware to Megacortex, emphasizes ICS threat

A new threat intelligence report has underscored the serious threat posed by the recently discovered Snake ransomware, which not only encrypts files,...

Embracing a Prevention Mindset to Protect Critical Infrastructure

A zero-trust, prevention-first approach is necessary to keep us safe, now and going forward.In the TV series Mr. Robot, Elliot Alderson, a gifted...

Election Security 2020: How We Should Allocate $425M in Funding

Too many states and municipalities still rely on aging systems; it's time they upped their game and treated election technology like they would...

Seven Years Later, Scores of EAS Systems sit Un-patched, Vulnerable

Two years after a false EAS alert about an incoming ICBM sowed terror in Hawaii, and seven years after security researchers warned about...

Pre-Olympics cybersecurity exercise kicks off in Tokyo

A three-day cybersecurity wargame began today in Tokyo in preparation for the upcoming Olympic Summer Games. This particular exercise has 140 workers from...

PupyRAT found sniffing around EU energy concern

A command and control server used by the Iranian-associate group PupyRAT that is communicating with the mail server of a European energy sector organization...

China-Based Cyber Espionage Group Reportedly Behind Breach at Mitsubishi Electric

Personal data on over 8,100 individuals and confidential business information likely exposed in June 2019 incident.A data breach at Japan's Mitsubishi Electric that...

Get ahead of the cybersecurity curve

Experienced cybersecurity leaders are beginning to call for a move from reactive detection to proactive prevention. It’s clear that the need to get ahead...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?