A new guide from the Cybersecurity and Infrastructure Security Agency aims to help healthcare and public health sector entities get a much tighter grip on managing serious risks posed by the most troublesome types of vulnerabilities threatening the beleaguered industry.
Cyberattacks target the very platforms and processes that your software development teams use. And too often this occurs because responsibility for software security falls in the cracks between your product teams and your enterprise security team.
View this webinar, where we will discuss:
Creating and...
Crown Jewel Analysis (CJA) is an iterative process that works top-down to systematically determine the physical & logical assets, data, and communication & control interfaces required for primary system function. Knowing the specific devices required for operation enables every aspect of vulnerability management,...
Join us as thought leaders in industrial cybersecurity, Robert M. Lee, CEO & Co-founder of Dragos, and Blake Moret, Chairman & CEO of Rockwell Automation, delve into critical topics surrounding the current state of manufacturing cybersecurity, manufacturers' responses to increasing risks, and the journey to enhance...
IoT devices, industrial, railway, automobile, and aircraft controls, as well as healthcare devices all have 3 things in common. First, these devices run on software and that software must be secured from cyberthreats as it is being developed. Second, when operating in the field, it is necessary to provide ongoing...
OT defenders may be experienced in the preparation for and response to industrial incidents such as fire, loss of containment, and other hazardous situations that can arise in industrial facilities. However, few OT defenders have the same level of training and experience in cybersecurity incident response in...
Venn Software landed Series A funding to help businesses ensure the security and compliance of data on laptops they don't necessarily manage or own. The $29 million will enable firms to control and govern corporate data on worker-owned devices without forcing users to launch remote virtual desktops.
Socure has purchased a document verification startup founded by former members of Airbnb's Trust and Safety Team for $70 million to better detect fake identities. The deal will help Socure optimize the digital capturing and back-end processing of driver's licenses and passports at faster speeds.
Gain clear visibility into the urgent need for robust OT cybersecurity in today's increasingly interconnected world. As boundaries between digital and physical infrastructure become increasingly fuzzy, industrial leaders face a daunting task in safeguarding a wide array of OT/ICS platforms.
Indeed, an...
As technology progresses, breaches progress and with hybrid work environments as the new norm, this means more devices are outside of the corporate network.
The question organizations must ask is how can users securely perform their work with a set of least privileges while preventing business disruption?
The...
More than 80% of UK organizations experienced a successful attack in 2021/2022. Over a 12-month period, ransomware attacks affected 73% of UK organizations with average cost of ransom payment of £1.08 million.
Join us alongside Oliver Rochford, an ex-Gartner analyst with extensive experience in cybersecurity, for...
Forescout will have its fourth CEO since September 2020. It tapped former Malwarebytes COO and MobileIron CEO Barry Mainz to take over as its top leader. The company brought in Mainz to replace Wael Mohamed, who started as Forescout's CEO in March 2021 and announced his departure in October 2022.
Ordr has tapped Jim Hyman, a former COO and Zscaler's first non-engineering hire, to fill the CEO job. Hyman is tasked with deepening the connected device vendor's bond with security stalwarts like Cisco and CrowdStrike and moving beyond opportunistic partnerships in favor of a concerted strategy.
The progress in modern medical care is remarkable. Increasing development of
Internet of Things (IoT) devices for the medical industry is a key factor in that
progress. In recent years, pacemakers, defibrillators, and other medical device
implants have gotten smaller and smarter.
While medical devices bring a host...
Digital transformation shows no signs of slowing down, even in a post-pandemic hybrid workforce. In fact, this new business paradigm continues to place an increased resource strain on security teams and cybersecurity debt permeates organizations. A recent survey of IT security decision makers uncovered that more than...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.