Flashback to 2004 and the genesis of National Cybersecurity Awareness Month (NCSAM), an initiative created to raise awareness in the U.S. around the importance of cybersecurity. Founded by the National Cyber Security Division within the Department of Homeland Security and the nonprofit National Cyber Security Alliance, NCSAM has taken place each October, since its mid-aughts inception, in efforts to ensure all Americans have knowledge of the resources and tools they need to be safer and more secure online.
International technology standards consortium Object Management Group® (OMG®) and the Industrial Internet Consortium® (IIC™) announced the first vertical profile for the recently released v1.2 of the IoT Security Maturity Model (SMM) Practitioner’s Guide. Targeted specifically for the retail industry, IoT SMM: Retail Profile for Point-of-Sale Devices will help retail organizations determine the right level of investment to meet their security needs.
AVANGRID announced the appointment of Brian Harrell to the role of Chief Security Officer and Vice President of Physical and Cybersecurity. Harrell will lead the security efforts across the company.
Why do organizations find it challenging to respond to social engineering incidents and how they can better defend against them? We talk to Daniel Wood, CISSP, GPEN, Associate Vice President of Consulting at Bishop Fox, to find out.
While the burgeoning world of IoT has transformed the ways in which we live and work, the world of IoT has also caught the attention of cybercriminals. As IoT devices become increasingly more advanced, hackers have simultaneously become more sophisticated in their attacks, often targeting pre-existing security loopholes to gain access to company systems.
A Russian national was charged with one count of conspiracy for his role in a conspiracy to recruit a Tesla employee to introduce malicious software into Tesla's computer network, extract data from the network, and extort ransom money from Tesla.
The Democratic National Committee (DNC) sent an alert to campaign staffers warning them to be vigilant against attempts by opposition groups to gain information on campaigns through dating apps.
In part 1 of this series, we covered why Distributed Internet of Things devices are attractive and vulnerable targets for cyber criminals and hackers. Now we turn our attention to strategies for protecting these devices, which in turn, helps to protect your entire network.
Network administrators have long been stretched thin in their attempts to maintain global endpoint security settings, configurations and patching. Now that most, if not all, of their organization’s employees are connecting remotely, the job has become even more difficult.