Nearly every aspect of modern life depends on industrial control systems (ICS) operating as expected. As ICS devices become increasingly connected, they also become increasingly vulnerable. By and large, commercial and critical infrastructure industrial orgs are underprepared for the digital convergence of their IT...
Gain clear visibility into the urgent need for robust OT cybersecurity in today's increasingly interconnected world. As boundaries between digital and physical infrastructure become increasingly fuzzy, industrial leaders face a daunting task in safeguarding a wide array of OT/ICS platforms.
Indeed, an...
As technology progresses, breaches progress and with hybrid work environments as the new norm, this means more devices are outside of the corporate network.
The question organizations must ask is how can users securely perform their work with a set of least privileges while preventing business disruption?
The...
In the digital world, trust acts as the conduit to a productive business-to-consumer relationship. A lack of brand trust may stifle new customer acquisition and average-customer-value (ACV). You can avoid these pitfalls and reap the benefits by adopting a business strategy which incorporates continuous trust to reduce...
Forescout will have its fourth CEO since September 2020. It tapped former Malwarebytes COO and MobileIron CEO Barry Mainz to take over as its top leader. The company brought in Mainz to replace Wael Mohamed, who started as Forescout's CEO in March 2021 and announced his departure in October 2022.
The tech giants in the MAMAA club have a disproportionate amount of data. It helps them easily identify customers - even when signing in on new devices - reduces the friction of identity challenges such as multifactor authentication, and helps them spot fraud. Unfortunately, most of the rest of the world sits under...
Ordr has tapped Jim Hyman, a former COO and Zscaler's first non-engineering hire, to fill the CEO job. Hyman is tasked with deepening the connected device vendor's bond with security stalwarts like Cisco and CrowdStrike and moving beyond opportunistic partnerships in favor of a concerted strategy.
Attacks against healthcare providers have risen every year for over a decade, with a large increase during the pandemic and a further rise of 94% in 2022. Many attacks exploit vulnerabilities in Internet of Medical Things (IoMT) devices to gain initial network access, taking advantage of underfunded security budgets,...
The progress in modern medical care is remarkable. Increasing development of
Internet of Things (IoT) devices for the medical industry is a key factor in that
progress. In recent years, pacemakers, defibrillators, and other medical device
implants have gotten smaller and smarter.
While medical devices bring a host...
Modern process manufacturing leverages unprecedented levels of connectivity to increase productivity and reduce cost. Nearly all of today’s manufacturing architectures have external connections to operations assets – exposing technology, processes, and intellectual property to cyber threats. Ransomware, phishing,...
Digital transformation shows no signs of slowing down, even in a post-pandemic hybrid workforce. In fact, this new business paradigm continues to place an increased resource strain on security teams and cybersecurity debt permeates organizations. A recent survey of IT security decision makers uncovered that more than...
As cybercriminals continually evolve their tactics to gain access to systems and data, organizations must navigate the risks of increased vulnerabilities and stay vigilant against emerging cyber threats. It is no longer enough to think of cybersecurity as segmented pieces of a strategy.
In this webinar, we will...
This whitepaper addresses questions raised by security leaders that want to better understand their organization’s development environments, the risks development tools expose and the best practices and approaches for securing them, across the software supply chain. Three focus areas are examined which address how...
In this era of Digital Transformation as our reliance on digital systems and technology increases, we see that it’s only cyberattacks that have broken away from this dependency and are exceeding in terms of both scale and severity.
Organizations, thought leaders and C-Suite officials are struggling to keep up...
Four ISMG editors discuss important cybersecurity issues, including the hot topics at ISMG roundtable discussions - such as challenges around software supply chain security, highlights from ISMG's upcoming Healthcare Summit, and how some cybersecurity vendors are creating their own venture funds.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.