news analysisAustralia’s cybersecurity strategy focuses on protecting small businesses and critical infrastructureThe Australian federal government released the 2023-2030 cybersecurity strategy, which focuses on protecting households and small businesses and has big expectations from telecommunications providers.By Samira Sarraf21 Nov 20238 minsSmall and Medium BusinessGovernmentCritical Infrastructure news analysis China, Ukraine, and Israel in the cyberwar spotlight as tensions riseBy Cynthia Brumfield13 Nov 20238 minsAdvanced Persistent ThreatsCyberattacksCritical Infrastructurenews Generative AI to fuel stronger phishing campaigns, information operations at scale in 2024By Samira Sarraf08 Nov 20236 minsPhishingCyberattacksGenerative AI newsUS launches “Shields Ready” campaign to secure critical infrastructureBy Michael Hill 08 Nov 20233 minsGovernmentComplianceCritical Infrastructure opinionHacking against humanity: Are Red Cross cyber rules credible?By Christopher Whyte 23 Oct 202313 minsHacker GroupsHackingCritical Infrastructure opinionHow the US DOD Cyber Strategy changes national cyber defenseBy Christopher Whyte 19 Oct 202310 minsGovernmentGovernmentMarkets news analysisCisco fixes serious flaws in emergency responder and other productsBy Lucian Constantin 05 Oct 20233 minsCritical InfrastructureNetwork SecurityVulnerabilities news analysisChina’s offensive cyber operations support “soft power” agenda in AfricaBy Michael Hill 21 Sep 20235 minsAdvanced Persistent ThreatsCyberattacksCritical Infrastructure news analysisIranian cyberspies target thousands of organizations with password spray attacksBy Lucian Constantin 15 Sep 20236 minsAdvanced Persistent ThreatsCyberattacksCritical Infrastructure ArticlesnewsNozomi Networks announces Vantage IQ to address security gaps in critical infrastructureVantage IQ is built to enhance threat detection and remediation with AI-assisted data analysis to help security teams reduce cyber risks across IT, OT, and IoT devices.By Michael Hill 16 May 2023 3 minsThreat and Vulnerability ManagementCritical InfrastructurenewsIBM unveils end-to-end, quantum-safe tools to secure business, government dataBy Michael Hill 10 May 2023 4 minsEncryptionIBMQuantum ComputingfeatureWhy Russia’s cyber arms transfers are poor threat predictorsSharing cyber tools and technology with nations such as Iran or North Korea has limited impact without also providing operational and organizational support.By Christopher Whyte 27 Apr 2023 12 minsAdvanced Persistent ThreatsCritical InfrastructurenewsAccenture, IBM, Mandiant join Elite Cyber Defenders Program to secure critical infrastructureLed by Nozomi Networks, the program aims to provide global industrial and government customers cybersecurity defense tools, incident response teams, and threat intelligence.By Michael Hill 25 Apr 2023 3 minsGovernmentIncident ResponseRSA Conferencenews analysisOT giants collaborate on ETHOS early threat and attack warning systemTop industrial cybersecurity competitors establish ETHOS, an early warning system that could help spot and avert damaging attacks on operational technology.By Cynthia Brumfield 24 Apr 2023 7 minsThreat and Vulnerability ManagementCritical InfrastructureRisk ManagementnewsHackers behind 3CX breach also breached US critical infrastructureThe attackers have been linked to North Korea and appear to be involved in cyberespionage and financially motivated attacks. By Apurva Venkat 24 Apr 2023 3 minsData BreachMalwareCritical InfrastructurenewsFive Eye nations release new guidance on smart city cybersecurityAustralia, Canada, New Zealand, UK, and US offer advice on potential smart city vulnerabilities and how to mitigate them.By Samira Sarraf 20 Apr 2023 4 minsGovernmentCritical InfrastructurenewsUK NCSC warns of new class of Russian cyber adversary threatening critical infrastructureNewly detected state-aligned groups are often sympathetic to Russia’s invasion of Ukraine and are ideologically, rather than financially, motivated.By Michael Hill 19 Apr 2023 3 minsAdvanced Persistent ThreatsCritical Infrastructurenews7 countries unite to push for secure-by-design developmentAgencies from across seven countries come together to create a guidance that aims to remove the burden of security from the technology buyer.By Samira Sarraf 17 Apr 2023 5 minsDevSecOpsInternet of ThingsApplication SecuritynewsCrowdStrike expands Falcon platform with XDR for IoT assetsCrowdStrike Falcon Insight for IoT delivers tailored threat prevention, patch management, and interoperability across XIoT including IoT, OT, and medical devices.By Michael Hill 11 Apr 2023 4 minsInternet of ThingsCritical InfrastructureIndustrynews analysisCISA warns of critical flaws in ICS and SCADA software from multiple vendorsSome of the vulnerabilities could allow attackers to access systems with ease. Patches are not available for all the flaws. By Lucian Constantin 07 Apr 2023 4 minsCritical InfrastructureVulnerabilitiesnews analysisNTC Vulkan leak shows evolving Russian cyberwar capabilitiesDocuments from a Russian intelligence subcontractor provide insight into the Kremlin's cyberwar objectives and potential long-term threats to Western organizations.By Christopher Whyte 07 Apr 2023 11 minsAdvanced Persistent ThreatsCyberattacksCritical Infrastructure Show more Show less View all Resources whitepaper Magic Quadrant for Distributed File Systems and Object Storage This Gartner Magic Quadrant research assesses the vision and execution of vendors in this market, and Dell Technologies, for the 7th consecutively year is ranked as a leader in the Magic Quadrant. The post Magic Quadrant for Distributed File Systems and Object Storage appeared first on Whitepaper Repository. By Dell Technologies and Intel(R) 24 Feb 2023Business ContinuityDigital TransformationEnterprise Storage whitepaper Top Reasons Why Customers Choose Dell VxRail By Dell Technologies Solutions and Intel(R) 24 Feb 2023Digital TransformationHyperconverged InfrastructureSoftware Development whitepaper Optimizing the PC Lifecycle: Dell PC as a Service By Dell Technologies 13 May 2022ComputersEmployee ExperienceIT Management View all Video on demand videoWhat the Colonial Pipeline ransomware attack suggests about critical infrastructure securityThe largest fuel pipeline in the United States, Colonial Pipeline, halted operations because of a ransomware attack. The attack was carried out by the cybercriminal group DarkSide. Much of the pipeline remains offline, although the pipeline operator aims to restore service by the end of the week. Mark Weatherford is the CISO at AlertEnterprise, Chief Strategy Officer at the National Cybersecurity Center and the former Deputy Under Secretary for Cybersecurity at the U.S. Department of Homeland Security. He joins Juliet to discuss what the Colonial Pipeline attack suggests about the state of critical infrastructure security, national security concerns and what steps critical infrastructure companies should take to secure their enterprise. 12 May 2021 22 minsRansomwareCyberattacksCritical Infrastructure Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14 15 Jan 2018 9 minsApplication SecurityCritical InfrastructureCybercrime See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news Top cybersecurity product news of the week By CSO staff 30 Nov 202317 mins Generative AIGenerative AIMachine Learning feature How to maintain a solid cybersecurity posture during a natural disaster By James Careless 30 Nov 20238 mins Security Operations CenterData and Information SecuritySecurity Practices news analysis Attackers could abuse Google's SSO integration with Windows for lateral movement By Lucian Constantin 30 Nov 20238 mins Multi-factor AuthenticationSingle Sign-onRemote Access Security podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University 16 Oct 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape 10 Oct 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication 06 Nov 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome 16 Oct 202315 mins CSO and CISO