• New Wave of Ransomware Could Put Utilities at Risk

    The stakes for protecting against ransomware are about to get higher as malicious tools evolve to target Industrial Control Systems (ICS) and threaten critical infrastructure. Researchers have demonstrated proof-of-concept ransomware attacks against programmable logic controllers (PLC) used in many operational …

  • 7 Practices that Make Your Organization Vulnerable to Cyber Attacks

    Today I read “How you can be the smartest cybersecurity expert in the room” on CIO.com. The author notes, “many CIOs and senior IT leaders are almost clueless about where to focus and how to start building next-gen security functions.” …

  • Your Greatest Threat Might Already Be Inside Your Network

    Insider activity—both malicious and simple error—accounts for a growing share of data breaches. Statistics are difficult to come by because requirements for reporting security incidents are not consistent across sectors. But some studies show they account for more than half …

  • Securing Assets and Applications in the Cloud

    In our recent blog, Cloud Security: Who is Responsible for What?, we focused on the idea of shared responsibility in cloud environments; with IaaS/PaaS, the customer is responsible for everything above the hypervisor, while the cloud vendor takes responsibility for …

  • SWIFT Security Concerns Resurface

    The Bangladesh Bank heist has resurfaced as reports around a potential perpetrator make headlines. The recent focus may be on who and why, but lessons should be learned from what happened – it’s important to recognize common attack patterns and …