TSA issues additional cybersecurity rules for the aviation sector

The Transportation Security Administration (TSA) issued a new cybersecurity amendment to the security programs of certain TSA-regulated (airport and aircraft) operators in the aviation sector, following similar measures announced in October 2022 for pa… Continue reading TSA issues additional cybersecurity rules for the aviation sector

Microsoft announces automatic BEC, ransomware attack disruption capabilities

Last year, Microsoft announced automatic attack disruption capabilities in Microsoft 365 Defender, its enterprise defense suite. On Wednesday, it announced that these capabilities will now help organizations disrupt two common attack scenarios: BEC (bu… Continue reading Microsoft announces automatic BEC, ransomware attack disruption capabilities

A glut of wiper malware hits Ukrainian targets

ESET researchers have discovered yet another wiper malware used to target Ukrainian organizations. Dubbed SwiftSlicer, it is thought to be wielded by the Sandworm APT. Simultaneously, the Ukranian CERT has confirmed that the attackers who recently aime… Continue reading A glut of wiper malware hits Ukrainian targets

Tech leaders: Create an IT operating model that can adapt to disruption and still deliver value

When undergoing an IT operating model transformation, focus on three key areas to ensure success: process, governance and culture.
The post Tech leaders: Create an IT operating model that can adapt to disruption and still deliver value appeared first o… Continue reading Tech leaders: Create an IT operating model that can adapt to disruption and still deliver value

After being breached once, many companies are likely to be hit again

Cymulate announced the results of a survey, revealing that two-thirds of companies who have been hit by cybercrime in the past year have been hit more than once, with almost 10% experiencing 10 or so more attacks a year. Research taken from 858 securit… Continue reading After being breached once, many companies are likely to be hit again

War in Ukraine: What type of cyber attacks can we expect next?

The cyber activities related to the ongoing war in Ukraine have run the gamut from wiper malware hitting organizations and the border control in Ukraine, DDoS attacks aimed at government and media websites, and cyber disruption of satellite-based inter… Continue reading War in Ukraine: What type of cyber attacks can we expect next?

Building confidence in your system’s security with chaos engineering

In this interview with Help Net Security, Aaron Rinehart, CTO at Verica, explains the discipline of chaos engineering and how it can help organizations build more resilient systems. Could you explain the discipline of chaos engineering? The practice ar… Continue reading Building confidence in your system’s security with chaos engineering

Building confidence in your system’s security with chaos engineering

In this interview with Help Net Security, Aaron Rinehart, CTO at Verica, explains the discipline of chaos engineering and how it can help organizations build more resilient systems. Could you explain the discipline of chaos engineering? The practice ar… Continue reading Building confidence in your system’s security with chaos engineering

Rush to remote work left sysadmins struggling to keep businesses safe

Remotely announced the results of a survey that details the degree to which enterprises have been left vulnerable to disruption in the wake of the rush to remote work by millions of employees during the Covid pandemic. The poll of 600 system and IT adm… Continue reading Rush to remote work left sysadmins struggling to keep businesses safe

Supply chain disruptions rose in 2021

56% of businesses experienced more supply chain disruptions in 2021 than 2020, a Hubs report reveals. Last year was marked by a number of challenges, including computer chip shortages, port congestion, the ongoing impacts of COVID-19, logistics impedim… Continue reading Supply chain disruptions rose in 2021