The advisory never mentions Russia – or any other country or hacking group – by name, but the language is notable because previous cybersecurity advisories put out in the wake of the Russian military build up and invasion have been careful to emphasize that there were no “specific or credible threats” driving their warnings.
New CISA report on the manufacturing sector said while many companies may need to automate to offset worker shortages, they also need to invest in cybersecurity talent so they can more effectively manage the factories of the future.
For decades, anyone analyzing network traffic concentrated on external network traffic, known as north-south traffic, through the perimeter via firewalls. Although firewalls evolved to better analyze this traffic, two primary trends emerged: 1) cloud adoption was causing the perimeter to become more porous, even to the point of extinction, and 2) as attackers gained sophistication, […]
As the perimeter shifts to the user and application, traditional network-based data loss prevention solutions are no longer effective. There is no longer a central network egress point to control the flow of data, as users, and the applications they access, are now distributed across the Internet. We need to rethink how we detect and […]
One of the many things I found interesting was this quote: “…spyware has become one of the biggest threats that businesses now face.” Hmmm, I wonder how they are defining Spyware? I’ve seen malware, labeled as “Spyware”, that created a backdoor on a users system. I believe that malware is a more appropriate term, and […]
“Infocon has been raised to Yellow due to the exploit being publicly available, combined with the lack of a patch for this specific vulnerability. Disable Javascript in your Internet Explorer browsers, or switch to another browser.” We started Episode 3 of Security Weekly with some good ‘ole fashioned IE bashing. While we may joke about […]