news analysisChina’s offensive cyber operations support “soft power” agenda in AfricaResearchers track Chinese cyber espionage intrusions targeting African industrial sectors.By Michael Hill21 Sep 20235 minsAdvanced Persistent ThreatsCyberattacksCritical Infrastructure news analysis Iranian cyberspies target thousands of organizations with password spray attacksBy Lucian Constantin15 Sep 20236 minsAdvanced Persistent ThreatsCyberattacksCritical Infrastructurenews analysis NIST releases Cybersecurity Framework 2.0 draftBy Cynthia Brumfield12 Sep 20237 minsComplianceCritical InfrastructureRisk Management newsNew research reveals most-attacked, most-vulnerable assetsBy Michael Hill 05 Sep 20234 minsCritical InfrastructureNetwork SecurityVulnerabilities news analysisMicrosoft demonstrates remote code execution exploit against PLCs that support CODESYS By Lucian Constantin 11 Aug 20236 minsCritical InfrastructureVulnerabilities newsUK calls artificial intelligence a “chronic risk” to its national securityBy Michael Hill 03 Aug 20234 minsGenerative AICritical Infrastructure featureWhy whistleblowers in cybersecurity are important and need supportBy Andrada Fiscutean 27 Jul 20239 minsCSO and CISOData PrivacyCritical Infrastructure news analysisHouse-passed US 2024 defense bill contains $13.5 billion for cyberspace activitiesBy Cynthia Brumfield 18 Jul 20238 minsMilitaryGovernmentCritical Infrastructure news analysisImplementation plan turns US National Cybersecurity Strategy into concrete objectivesBy Cynthia Brumfield 14 Jul 20236 minsGovernmentComplianceCritical Infrastructure ArticlesnewsUK NCSC warns of new class of Russian cyber adversary threatening critical infrastructureNewly detected state-aligned groups are often sympathetic to Russia’s invasion of Ukraine and are ideologically, rather than financially, motivated.By Michael Hill 19 Apr 2023 3 minsAdvanced Persistent ThreatsCritical Infrastructurenews7 countries unite to push for secure-by-design developmentAgencies from across seven countries come together to create a guidance that aims to remove the burden of security from the technology buyer.By Samira Sarraf 17 Apr 2023 5 minsDevSecOpsInternet of ThingsApplication SecuritynewsCrowdStrike expands Falcon platform with XDR for IoT assetsCrowdStrike Falcon Insight for IoT delivers tailored threat prevention, patch management, and interoperability across XIoT including IoT, OT, and medical devices.By Michael Hill 11 Apr 2023 4 minsInternet of ThingsCritical InfrastructureIndustrynews analysisCISA warns of critical flaws in ICS and SCADA software from multiple vendorsSome of the vulnerabilities could allow attackers to access systems with ease. Patches are not available for all the flaws. By Lucian Constantin 07 Apr 2023 4 minsCritical InfrastructureVulnerabilitiesnews analysisNTC Vulkan leak shows evolving Russian cyberwar capabilitiesDocuments from a Russian intelligence subcontractor provide insight into the Kremlin's cyberwar objectives and potential long-term threats to Western organizations.By Christopher Whyte 07 Apr 2023 11 minsAdvanced Persistent ThreatsCyberattacksCritical Infrastructurenews analysisCISA funding to top $3 billion under Biden’s FY 2024 budgetPresident Biden's FY2024 budget increases CISA's budget to over $3 billion and boosting spending on several cyber initiatives. By Cynthia Brumfield 10 Mar 2023 5 minsGovernmentCritical InfrastructureData and Information Securitynews analysisWhite House releases an ambitious National Cybersecurity StrategyThe Biden administration's National Cybersecurity Strategy calls for more regulation on critical infrastructure providers and holds software providers accountable for their insecure products. By Cynthia Brumfield 02 Mar 2023 9 minsRegulationAdvanced Persistent ThreatsApplication SecurityopinionHow to de-risk your digital ecosystemDigital ecosystems are big, complicated, and a massive vector for exploits and attackers. Santha Subramoni, global head, cybersecurity business unit at Tata Consultancy Services discusses digital ecosystems security and how businesses can lower risk within their digital ecosystems.By Santha Subramoni 28 Feb 2023 10 minsInternet SecurityCritical InfrastructureData and Information Securitynews analysisAttacks on industrial infrastructure on the rise, defenses struggle to keep upA Dragos report shows threat actors new and old have the potential to cause major disruptions of critical infrastructure.By Lucian Constantin 14 Feb 2023 10 minsHacker GroupsMalwareCritical InfrastructurenewsOPSWAT mobile hardware offers infrastructure security for the air gapA new, tablet-sized media scanner boasts a wide range of capabilities for critical infrastructure defense.By Jon Gold 06 Feb 2023 3 minsCritical InfrastructureSecuritynews analysisMany ICS flaws remain unpatched as attacks against critical infrastructure riseMore than a third of ICS device vulnerabilities have no patch available at a time when ICS environments face threats from new cybercrime groups.By Lucian Constantin 19 Jan 2023 8 minsCritical InfrastructureVulnerabilitiesnews analysisNATO tests AI's ability to protect critical infrastructure against cyberattacksCybersecurity experts experiment with autonomous intelligence to secure and defend against increasing cyberthreats posed to critical infrastructure.By Michael Hill 05 Jan 2023 6 minsCritical InfrastructureArtificial Intelligence Show more Show less View all Resources whitepaper Data Protection in a Multicloud World Data protection challenges resulting in disruption are on the rise with public clouds and cyberattacks the leading areas of concern. Organizations that continue to modernize data protection can minimize risk and raise confidence levels The post Data Protection in a Multicloud World appeared first on Whitepaper Repository. By Dell Technologies 18 May 2023Cloud SecurityData and Information SecurityMulti Cloud whitepaper Top reasons why customers choose Dell VxRail By Dell Technologies 18 May 2023Infrastructure ManagementIT ManagementSystem Management whitepaper The Long Road Ahead to Ransomware Preparedness By Dell Technologies 17 May 2023Cloud SecurityRansomwareSecurity View all Video on demand videoWhat the Colonial Pipeline ransomware attack suggests about critical infrastructure securityThe largest fuel pipeline in the United States, Colonial Pipeline, halted operations because of a ransomware attack. The attack was carried out by the cybercriminal group DarkSide. Much of the pipeline remains offline, although the pipeline operator aims to restore service by the end of the week. Mark Weatherford is the CISO at AlertEnterprise, Chief Strategy Officer at the National Cybersecurity Center and the former Deputy Under Secretary for Cybersecurity at the U.S. Department of Homeland Security. He joins Juliet to discuss what the Colonial Pipeline attack suggests about the state of critical infrastructure security, national security concerns and what steps critical infrastructure companies should take to secure their enterprise. 12 May 2021 22 minsRansomwareCyberattacksCritical Infrastructure Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14 15 Jan 2018 9 minsApplication SecurityCritical InfrastructureCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news analysis DHS unveils one common platform for reporting cyber incidents By Cynthia Brumfield 25 Sep 202310 mins RegulationRegulationRegulation news Chinese state actors behind espionage attacks on Southeast Asian government By Shweta Sharma 25 Sep 20234 mins Advanced Persistent ThreatsCyberattacks feature How to pick the best endpoint detection and response solution By Linda Rosencrance 25 Sep 202310 mins Intrusion Detection SoftwareSecurity Monitoring SoftwareData and Information Security podcast CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical 20 Sep 202312 mins CSO and CISO podcast CSO Executive Sessions Australia with Siddiqua Shaheen, Head of Cyber Governance at Lander & Rogers 07 Sep 202317 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role 06 Sep 202310 mins CSO and CISO video CSO Executive Sessions Australia with Nicole Neil, Director of Information Security at Seer Medical 20 Sep 202312 mins CSO and CISO video What is zero trust security? 06 Sep 20233 mins AuthenticationZero TrustNetwork Security video CSO Executive Sessions / ASEAN: IHH Healthcare's Francis Yeow on defining the CISO role 06 Sep 202310 mins CSO and CISO