This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
The National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) built a laboratory environment to demonstrate how energy organizations can strengthen their operational technology (OT) asset management practices by leveraging capabilities that may already exist within their operating environment or by implementing new capabilities.
The Remote Desktop Protocol (RDP) is one of the top tools utilized by cyber attackers to move laterally and exfiltrate data from a network before introducing their malicious software to perform internal reconnaissance, according to a new Vectra 2019 Spotlight Report on RDP.
American universities are breeding grounds for innovation and research for students from across the globe. They are also a primary target of IP theft and cyber-attacks by some of these very students and their governments. America’s universities, supported by industry and by the U.S. federal and state governments, must be ready to protect the billions of U.S. dollars invested by the U.S. government and corporations to develop new technologies.
In an era of increasingly sophisticated security threats, CIOs, CISOs, and COOs alike need to be more committed than ever to protect their data, facilities, and teams.
The lack of visibility into the expanded cloud attack surface is a fast-growing problem that is only getting worse. Although we have seen misconfigurations in the cloud before, the Capital One breach is a sobering reality check for the security industry. We need to vastly improve threat detection and response in cloud environments.
More than 700,000 people had their data and personally identifiable information exposed in healthcare breaches reported to the federal government in August of 2019.
In today’s dynamic environments, risk must be proactively managed. However, lack of sufficient intelligence can make it impossible to get ahead of threats and breaches. Fortunately, artificial intelligence (AI) has emerged as a valuable tool in augmenting physical security with a more proactive approach.