New research analyzes industrial cybersecurity maturity

As the frequency and severity of cyberattacks on industrial organizations increase, defenders struggle to keep ahead of threats. Security leaders know that a unified IT and operational technology (OT) approach is key to protecting the safety and availability of operations but are faced with cultural and technical differences between IT best practices and OT. A new report, “The 2021 State of Industrial Cybersecurity,” produced by the Ponemon Institute — sponsored by Dragos — reveals key challenges industrial organizations face today and provides actionable solutions on how they can mature their cybersecurity strategies. The report covers: Cybersecurity maturity level for industrial control systems (ICS) and OT How organizations secure their ICS/OT OT cybersecurity investment, priorities and accountability The cause and consequences of an ICS/OT ransomware and cybersecurity incident Learn more on building a unified strategy that secures both IT and OT environments.  This article was produced by CyberScoop for, and sponsored by, […]

The post New research analyzes industrial cybersecurity maturity appeared first on CyberScoop.

Continue reading New research analyzes industrial cybersecurity maturity

Many users don’t know how to protect their broadband Wi-Fi routers

Millions of home broadband Wi-Fi routers in the UK could be at risk because many internet users do not take basic security precautions that could protect them from online threats, research from Broadband Genie has found. Broadband Wi-Fi routers at risk… Continue reading Many users don’t know how to protect their broadband Wi-Fi routers

Supply chain cybersecurity: Pain or pleasure?

Whatever sector your business operates in, you will depend on third parties to provide you with goods and services to support what you do. Whether you are a small printing services company working with an accountant or an organization with a full manuf… Continue reading Supply chain cybersecurity: Pain or pleasure?

SMBs should consider new approaches for increasing their cybersecurity posture

SMBs can obtain advice about cybersecurity quite easily from a plethora of resources. Getting their hands on practical technology solutions is, on the other hand, more of a problem, as they are often greatly constrained by their budget. Still, there ar… Continue reading SMBs should consider new approaches for increasing their cybersecurity posture

Insider threat does not have to be malicious, so how do you protect your organization?

In this interview with Help Net Security, Laura Hoffner, Chief of Staff at Concentric, talks about the causes of insider threat attacks and what companies can do to mitigate or even avoid them. In these particularly tumultuous times, when organizations… Continue reading Insider threat does not have to be malicious, so how do you protect your organization?

A CISO’s guide to discussing cybersecurity with the board

With data breaches on track to reach all-time high, chief information security officers (CISOs) are on alert to find blind spots in IT infrastructures and mitigate risks to keep their organizations safe. Recent high-profile attacks should be enough war… Continue reading A CISO’s guide to discussing cybersecurity with the board

Need to improve application security? Reduce friction between developers and security teams

Tromzo has released the findings from their report, based on a survey of 403 US-based application security practitioners who work at organizations where their development team uses CI/CD systems. “The findings confirm our belief that security tea… Continue reading Need to improve application security? Reduce friction between developers and security teams

Changing the Conversation with Risk Quantification

“Quantitative risk analysis is the single most effective way to align security with business priorities and establish credibility with teams.” — U.S.-based CISO As organizations continue to leverage the latest technologies and move toward even greater interconnectivity in the pursuit of growth, business strategy and cybersecurity continue to converge. Cybersecurity concerns now extend beyond the […]

The post Changing the Conversation with Risk Quantification appeared first on Security Intelligence.

Continue reading Changing the Conversation with Risk Quantification

How to avoid “festive fraud” during the holiday season

The year-end holiday season is a time for celebration – a chance to decorate homes, splurge on gifts and gather with family and friends. It’s also a time when the scammers come out in full force. Last year, 1 in 4 people fell victim to fraud during the… Continue reading How to avoid “festive fraud” during the holiday season