Palo Alto SASE 5G Health Care's Biggest Security Threat

Health Care Security Must Mature With 5G

It’s clear that 5G technology is rapidly coming of age, and is enjoying wide adoption across every industry. According to Gartner, the market for 5G infrastructure was predicted to hit $4.2 billion ...
Security Boulevard

ENISA Releases Guidelines for Cloud Security for Healthcare Services

The healthcare sector is undergoing digitalization and adopts new technologies to improve patient care, offer new services for remote patients and reach operational excellence. The integration of new technologies in the complex ...

Cybersecurity Challenges for the European Railways

The European Union Agency for Cybersecurity (ENISA) released in November 2020 its “Cybersecurity in Railways” report to raise awareness about the cybersecurity challenges facing Europe’s railways. The report identifies the current cybersecurity ...
ENISA: Top 15 Threats: Spam, Phishing, and Malware!

ENISA: Top 15 Threats: Spam, Phishing, and Malware!

| | ENISA, Phishing, Spam
Part One of this post, describing the many components of "The Enisa Cybersecurity Threat Landscape" went over ENISA's Year in Review, the emphasis on Cyber Threat Intelligence, Sector specific threats, Research Topics, ...
The ENISA Cybersecurity Threat Landscape

The ENISA Cybersecurity Threat Landscape

 ENISA, the European Union Agency for CyberSecurity, met on October 6, 2020 to review their current recommendations and get any last minute changes.  On October 20, 2020, they released a huge batch ...

Effective Threat Intelligence Through Vulnerability Analysis

Vulnerabilities are weaknesses leveraged by adversaries to compromise the confidentiality, availability or integrity of a resource. The vulnerability ecosystem has matured considerably in the last few years. A significant amount of effort ...

Navigating Cyber Landscape of Connected and Autonomous Cars

In recent years, various attacks have been performed to highlight security concerns about evolving smart cars. In particular, remote hacks took a lot of attention in 2015 when two security researchers hijacked ...
Assessment Frameworks for NIS Directive Compliance fig 1

Assessment Frameworks for NIS Directive Compliance

According to the NIS Directive, Member States should adopt a common set of baseline security requirements to ensure a minimum level of harmonized security measures across EU and enhance the overall level ...

“All for One and One for All”

… So chanted the Three Musketeers. One of my main issues with cybersecurity risk management is that organizations seek to secure their own systems, data and networks, hoping that attackers will move ...