You searched for legacy systems | SC Media

Your search for legacy systems returned 47 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 12 months remove

Your search for legacy systems returned 47 results

Sort Results:

Relevant Recent
Perspectives

Legacy IT: The hidden problem of digital transformation

Legacy IT has become the dirty little secret of digital transformation. These systems, which include servers, OSes, and applications, are relied on by almost every organization for business-critical activities – and many CISOs struggle to protect them from attackers.
Government, Security News, Vulnerabilities

Hackers chain Windows, VPN bugs to access government systems

Threat actors have gained access to government networks through a combination of Windows and VPN bugs, a commonly used tactic known as vulnerability chaining in which multiple bugs are used in a single intrusion to compromise a network or application. The recent malicious activity took aim at federal and state, local, tribal and territorial government…
APTs/cyberespionage, Government, Security News, Vulnerabilities

Legacy ICS puts critical infrastructure at risk

By using search engines dedicated to scanning all open ports, or scanning the ports themselves, hackers can remotely take control of critical private and public U.S. infrastructure run largely by industrial control systems (ICS) that weren’t built with security in mind. American water and energy providers are particularly vulnerable to cyberattack because their legacy ICSs…
SC Awards

The 2020 Trust Award winners

Here’s a look at which solutions took home the top Trust honors and why, and what some of the winning companies have experienced in the months since the award presentation in February.
Next post in Editorial