Data centers on steel wheels: Can we trust the safety of the railway infrastructure?

In this interview for Help Net Security, Dimitri van Zantvliet Rozemeijer, CISO at Nederlandse Spoorwegen (Dutch Railways), talks about railway cybersecurity and the progresses this industry has made to guarantee safety. Critical infrastructure has see… Continue reading Data centers on steel wheels: Can we trust the safety of the railway infrastructure?

NIST updates guidance for cybersecurity supply chain risk management

The National Institute of Standards and Technology (NIST) has updated its guidance document for helping organizations identify, assess and respond to cybersecurity risks throughout the supply chain. “[Cybersecurity Supply Chain Risk Management Pr… Continue reading NIST updates guidance for cybersecurity supply chain risk management

Nothing personal: Training employees to identify a spear phishing attack

Phishing attacks began years ago as simple spam, designed to trick recipients into visiting sites and becoming customers. In the meantime, they have morphed into a worldwide criminal industry. In recent years, threat actors have refined their methods o… Continue reading Nothing personal: Training employees to identify a spear phishing attack

Tackling the threats posed by shadow IT

While remote technologies have allowed businesses to shift their workforces online, this flexibility has created a swathe of challenges for IT teams who must provide a robust security framework for their organization – encompassing all the person… Continue reading Tackling the threats posed by shadow IT

How to avoid security blind spots when logging and monitoring

Cybersecurity involves a balancing act between risk aversion and risk tolerance. Going too far to either extreme may increase cost and complexity, or worse: cause the inevitable business and compliance consequences of a successful cyberattack. The deci… Continue reading How to avoid security blind spots when logging and monitoring

308,000 exposed databases discovered, proper management is key

Group-IB carried out a deep dive into exposed digital assets discovered in 2021. During the research, the attack surface management team analyzed instances hosting internet-facing databases. The findings showed that in the second half of 2021, the numb… Continue reading 308,000 exposed databases discovered, proper management is key

Siloed technology management increases operational blind spots and cyber risk

Oomnitza revealed a snapshot survey, conducted by Gatepoint Research, which found that siloed technology management is increasing operational blind spots and cyber risk. While 76% of enterprises employ multiple systems to oversee the underlying technol… Continue reading Siloed technology management increases operational blind spots and cyber risk

Strengthening the ability of public companies to combat cybersecurity threats

The National Association of Corporate Directors (NACD), SecurityScorecard and the Cyber Threat Alliance released a report that examines the U.S. Securities and Exchange Commission’s recently proposed rules and amendments on cybersecurity reporting requ… Continue reading Strengthening the ability of public companies to combat cybersecurity threats

IT leaders require deeper security insights to confidently manage multi-cloud workloads

Gigamon released recent findings from a Pulse.qa study which surveyed IT and InfoSec leaders to identify challenges associated with advancing their multi-cloud strategies. According to the survey, the majority of respondents believe there is room for i… Continue reading IT leaders require deeper security insights to confidently manage multi-cloud workloads

Unmanaged and unsecured digital identities are driving rise in cybersecurity debt

A global report released by CyberArk shows that 79% of senior security professionals state that cybersecurity has taken a back seat in the last year in favor of accelerating other digital business initiatives. The report identifies how the rise of huma… Continue reading Unmanaged and unsecured digital identities are driving rise in cybersecurity debt