April 2019

The big picture: According to a 2018 Gartner report, only 35% of firms had the chief information security officer’s (CISO) department or an equivalent in charge of their industrial networks — often referred to as operational technology (OT) as opposed to business systems, the traditional IT. But that number is projected to double by 2021. […]

by

BETHESDA, Md., April 18, 2019 /PRNewswire/ — SANS Institute, the global leader in cyber security training and certifications, today announced SANS Rocky Mountain 2019 (#SANSRockyMountain) taking place July 15-20 in Denver, CO. The event features courses and evening talks addressing some of today’s most complex cyber security issues. Included on the agenda is a keynote by SANS Fellow […]

by

THE KEY Unrecognizable computer hacker commits a cyber attack using his laptop computer in home office or business office. (iStock) Want to know the most effective ways businesses defend themselves against hacking? Good luck. There’s a mountain of marketing material about that and other cybersecurity topics, but a dearth of high-quality, vetted data that researchers […]

by

Start spreading the news, folks. New York City wants to be king of the hill, top of the heap, “A” number-one in cybersecurity. The city that never sleeps needs cybersecurity pros to defend against the attacks that never sleep. Wall Street banks and hedge funds are working closely with the city to attract experienced security […]

by

Targeted cyberattacks are becoming increasingly popular with cybercriminals. Previously, they relied on less lucrative, automated spray-and-pray attacks to evade internal security measures. But today, cybercriminals are turning to targeted ransomware attacks, according to the SophosLabs 2019 Threat Report. “The reason that these types of attacks are so effective is because there is actually a human […]

by

Hackers have revealed details about the inner workings of a cyber-espionage group mostly known in the security community as OilRig, APT34, and HelixKitten, linked to the Iranian government. Using the online name Lab Dookhtegan, the hackers used a Telegram channel to dump information about APT34’s infrastructure, hacking tools, members, and victims. The data dump is […]

by

Cyber crime in the industrial sector has reached pandemic levels, as attackers stop at nothing to shut down power generation plants in cities, factories and mining firms. This is according to Mike Bergen, business development director for Middle East and Africa at engineering services company GECI International, speaking at a GECI media round table in […]

by