Search results: colonial pipeline

Cybersecurity for Oil and Gas: An Overview

The growing value of business data, the vulnerability of networked systems, and the importance of fuel infrastructure have made oil and gas companies major targets for malicious hackers. Already, the industry has ...

The Fight Against Ransomware Calls For a New Backup Strategy

|
The Fight Against Ransomware Calls For a New Backup Strategy michelle Tue, 11/02/2021 - 09:39 Once-a- day backups leave a whole day’s worth of transactions unprotected. In the digital economy, losing such ...
A Brief History of Ransomware Evolution

A Brief History of Ransomware Evolution

Wondering where the scourge of ransomware attacks currently stands? In a recent report titled Ransomware: The True Cost to Business, we noted that ransomware attacks occur about every 11 seconds. That rate ...
operational supply chain ICS cybersecurity critical infrastructure environment climate

Cyberattacks in 2021 Highlighted Critical Infrastructure Risks

Concerns regarding cyberattacks against critical infrastructure have elevated industrial control systems (ICS) security to a mainstream topic. The first half of the year saw an increase in vulnerabilities found in ICS, exposing ...
Security Boulevard
APT AiTM quantum attacks Raspberry Robin APT29 ransomware NATO Barracuda Networks ATO Attacks

Is Ransomware a Technology Pandemic in the Making?

Ten years ago, ransomware attacks were inconvenient. But today, they present an apocalyptic national security threat capable of crippling infrastructure that the population depends on. “No one country, no one group, can ...
Security Boulevard

Protecting Your Enterprise from Ransomware with MixMode

Monthly reports that lack relevant details about an organization’s true risk level are insufficient and not representative of the further steps an organization should take to protect itself. This approach leaves organizations ...
Effective software security activities for managing supply chain risks

Effective software security activities for managing supply chain risks

BSIMM12 reports increased attention on software security due to recent supply chain disruptions. Get recommendations for managing supply chain risks. The post Effective software security activities for managing supply chain risks appeared ...
cybersecurity energy infrastructure

Protecting Critical Infrastructure with Automation and Zero-Trust

Politicians on the Homeland Security Committee have recently presented a bill for review which would require critical infrastructure organizations to report data breaches and ransomware payments to the federal government. This comes ...
Security Boulevard

Useful Tips for Choosing a Cloud Security Vendor

| | Cloud
A guide for what to take into account when starting to evaluate cloud security solutions. What to consider, how to determine value and how to navigate between capabilities and your needs. The ...
Predictive Ransomware Protection: The Key to Ending a Global Crisis

Predictive Ransomware Protection: The Key to Ending a Global Crisis

Successful ransomware attacks take time. They involve gaining a foothold in the enterprise, conducting reconnaissance, escalating privileges, and then locating and exfiltrating your organization’s most sensitive data. The entire process, up until ...

Secure Guardrails