Dragos Intelligence has been tracking activity by the VOLTZITE Threat Group, which overlaps with Volt Typhoon, since early 2023. Last week, the Cybersecurity & Infrastructure Security Agency (CISA) released a report detailing some of the techniques, tools, and infrastructure used by VOLTZITE over the course of the...
Are you prepared to defend your operational technology (OT) against the next wave of cyber threats? The 7th annual Dragos Year in Review Executive Summary gives you just the highlights from this year’s report to help you stay ahead of cyber attacks and protect your business operations in 2024.
The Executive...
As we confront the relentless tide of cyber incidents, the OT Cybersecurity Year in Review stands as an anchor, offering clarity and direction for executives and practitioners at the helm of operational technology cyber defense. The 7th edition of the Dragos OT Cybersecurity Year in Review report synthesizes the...
Cybersecurity truism: Focusing on the basics helps defenders arrest many of today's top attacks, as well as tomorrow's. While IT defenders have been repeating that mantra for years, experts say it also applies to operational technology environments, including ICS and SCADA systems.
In his first week in his new role as interim CEO of SSH Communications Security, Rami Raulas shares insights on the company’s strategic focus on zero trust, operational technology security, and quantum-safe cryptography to address evolving cybersecurity challenges.
SSH Communications Security CEO Teemu Tunkelo left the Finnish cybersecurity vendor abruptly Monday after low license sales in late 2023 slowed the company's growth. No reason was given for Tunkelo's departure, which stems from an agreement between the CEO and SSH and will take effect immediately.
It's not just medical device cybersecurity that's keeping some healthcare security leaders up at night - it's also the risks posed by other critical connected gear that patients and clinicians depend upon, said Ali Youssef, director of medical device and emerging tech security at Henry Ford Health System.
Today’s PAM programs face a more vast and dynamic threat landscape, upended by
innovation and reshaped by new identities, new environments and new threats
Technology shifts allow organizations to delegate powerful access to anyone, from admins and vendors
to cloud engineers and developers. Even everyday business...
The Biden administration's focus on addressing long-standing vulnerabilities in IT and OT at U.S. ports is a step in the right direction, and new incident reporting mandates could significantly benefit smaller, resource-strapped ports, experts told ISMG.
Threats to critical infrastructure are on the rise, as threat actors continue to scan networks, attack networks and devices, and try to get past access controls. At the same time, according to a new report, sectors such as manufacturing have experienced a 230% increase in vulnerabilities.
The FDA's multifaceted approach to strengthening medical device security centers on several key areas, including enhanced regulatory oversight, industry collaboration and a recent organizational change that raises the profile of the agency's device work, said the FDA's Dr. Suzanne Schwartz.
Industrial automation and security experts at VDC Research surveyed professionals with cybersecurity expertise about industrial organizations’ IT and OT systems. Read this whitepaper to learn about new trends and best practices implemented to address the security of operational technology systems, including how...
The benefits of digital transformation and connectivity in OT environments are undeniable but so are the risks. Zero Trust provides proven protection across operational technology assets and networks, remote operations and 5G networks.
Read the e-book "Zero Trust Security to Protect All OT Environments" to learn...
Here's one reason why Iranian state hackers may have been able to target Israeli-made pressure-monitoring controllers used by American water systems: Nearly 150 of the controllers are exposed to the internet - and some still use the default password 1111.
Explore the Future of Cybersecurity with Cortex XSIAM® - Palo Alto Networks' AI-Driven Security Operations Platform. Discover how this innovative approach leverages AI to enhance, not replace, your security teams. Dive into our informative infographic to learn more.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.