Amazon, Google, Microsoft etc. making major commitments to shore up nation’s cyber-defenses just won’t be enough, researchers say.
Experts urged enterprises to patch fast: SAP vulnerabilities are being weaponized in a matter of hours.
Enormous botnets of IoT devices are going after decades-old legacy systems that are rife in systems that control crucial infrastructure.
Critical ICS vulnerabilities can be exploited through leading cloud-management platforms.
Curtis Simpson, CISO at Armis, discusses the stop qualities that all CISOs need to possess to excel.
The ‘ModiPwn’ bug lays open production lines, sensors, conveyor belts, elevators, HVACs and more that use Schneider Electric PLCs.
Jen Easterly, former NSA official and Morgan Stanley vet, will take up the lead at CISA as the ransomware scourge rages on.
Security vulnerabilities in the ERP platform could allow attackers to tamper with or sabotage victims’ business-critical processes and to intercept data.
Nate Warfield, CTO of Prevailion and former Microsoft security researcher, discusses the many security challenges and failings plaguing this industry.
Kerry Matre, senior director at Mandiant, discusses the appropriate metrics to use to measure SOC and analyst performance, and how MTTR leads to bad behavior.