Operational technology asset visibility fuels a capable cybersecurity program

New report offers insights into the vital role of asset visibility in protecting the entire operational technology environment.

The post Operational technology asset visibility fuels a capable cybersecurity program appeared first on CyberScoop.

Continue reading Operational technology asset visibility fuels a capable cybersecurity program

Planning a robust response to cyberthreats with a zero-trust mindset

New white paper outlines near-term tactics to energize government agencies’ cybersecurity efforts and zero trust implementation.

The post Planning a robust response to cyberthreats with a zero-trust mindset appeared first on CyberScoop.

Continue reading Planning a robust response to cyberthreats with a zero-trust mindset

New research identifies poor IAM policies as the greatest cloud vulnerability

Palo Alto Networks threat intelligence unit finds identity and access management policy flaws remain a principal cause of cloud security vulnerabilities.

The post New research identifies poor IAM policies as the greatest cloud vulnerability appeared first on CyberScoop.

Continue reading New research identifies poor IAM policies as the greatest cloud vulnerability

Combatting emerging-malware aimed at industrial control systems

New report offers insights on CHERNOVITE and the PIPEDREAM malware that threatens industrial control systems.

The post Combatting emerging-malware aimed at industrial control systems appeared first on CyberScoop.

Continue reading Combatting emerging-malware aimed at industrial control systems

Achieving web application security

Adopting web application security can help optimize workflow, drive efficiencies and meet agency missions.

The post Achieving web application security appeared first on CyberScoop.

Continue reading Achieving web application security

Achieving web application security

Adopting web application security can help optimize workflow, drive efficiencies and meet agency missions.

The post Achieving web application security appeared first on CyberScoop.

Continue reading Achieving web application security

New security threats target industrial control and OT environments

A new Dragos report highlights recent threats targeting industrial control systems and operational technology environments and identifies strategies to address them.

The post New security threats target industrial control and OT environments appeared first on CyberScoop.

Continue reading New security threats target industrial control and OT environments