Code-injection via third- and fourth-party scripts — as seen with Magecart — is a growing security problem for websites.
IIoT-generated data – calibrations, measurements and other parameters – still need to be stored, managed and shared securely.
Unlike Elliot, real-world adversaries don’t have lofty ideals nor do they suffer crises of conscience.
Mission-critical systems can’t just be switched off to apply security updates — so patching can take weeks if not years.
Tactics for when authorized users need to connect to network resources, or need to venture out to the web to complete important tasks.
Here are things you can do right now to shore up your defenses and help your recovery when you get hit.
How to determine — and communicate — the value of Threat Intelligence Gateways (TIGs) in your enterprise.
The idea that humans are the weakest link shouldn’t guide the thinking on social-engineering defense.
Simply implementing best practices is not enough to address the risk coming from your own employees.
Implementing game mechanics and competition into the mix can incentivize employees to improve their cybersecurity posture.