It’s difficult for security teams to get executive buy-in to address the problem because measuring and improving AD security is challenging. There are several reasons why.
Together, cyber and physical assets represent a significant amount of risk to physical security and cybersecurity — each can be targeted, separately or simultaneously, to result in compromised systems and infrastructure.
Given the rising attacks on critical infrastructure and the interconnected mesh of cyber-physical systems, the United States government is looking to better coordinate protection efforts that anticipate and counter criminal groups’ tactics, techniques and procedures, to help prevent attacks from reaching their intended targets.
The U.S. House Committee on Oversight and Reform has requested a briefing with the Federal Bureau of Investigation (FBI) to determine whether it was justified in withholding the Kaseya ransomware decryption key.
To address the threat cybercriminals and foreign adversaries pose to DOD data, the department recently introduced the Cybersecurity Maturity Model Certification (CMMC). What is the CMMC, what does it consist of, and is it worth the expense?
The critical infrastructure public and private sector can look to America’s electric companies for a holistic approach and partnership on supporting essential improvements to security posture and culture.
As threats evolve from emboldened and increasingly sophisticated malicious actors targeting critical infrastructure, the electric sector has developed a holistic and shared-responsibility approach that has supported key improvements to the security posture and culture of electric companies.
Salt Labs found that nearly every organization using Elastic Stack is affected by a new vulnerability, which makes users susceptible to injection attacks. Bad actors can use injection attacks to exfiltrate data and launch denial of service (DoS) events.
In acknowledgment of the wide-reaching effects that damage to critical infrastructure organizations and systems can impart, Security has dedicated our October 2021 issue to Critical Infrastructure Security. This month, our features cover the challenges and risks associated with this market sector, along with solutions and best practices security leaders can take to mitigate some of those risks. Here, we cover a few simple steps critical infrastructure security leaders can take to proactively build a program of resiliency.
On-premises infrastructure has long been considered safer and more securable than its cloud counterpart. An increase in cyberattacks on on-premises systems is challenging this surety.