Hallway Con and Hacking Travel Technology

The COVID-19 pandemic has brought much of the world to its knees and sent ripples across all regions and industries. One consequence of the pandemic has been the elimination of large gatherings—meaning no in-person conferences or conventions. Events li… Continue reading Hallway Con and Hacking Travel Technology

Cyberattackers Target Norwegian Parliament

The Norwegian Parliament, also known as the Storting, made an extremely shocking revelation by issuing a press release at theContinue reading
The post Cyberattackers Target Norwegian Parliament appeared first on Kratikal Blog.
The post Cyberattackers T… Continue reading Cyberattackers Target Norwegian Parliament

Cyberattackers Target Norwegian Parliament

The Norwegian Parliament, also known as the Storting, made an extremely shocking revelation by issuing a press release at theContinue reading
The post Cyberattackers Target Norwegian Parliament appeared first on Kratikal Blog.
The post Cyberattackers T… Continue reading Cyberattackers Target Norwegian Parliament

Surge in Cyberattacks Puts Manufacturing OT Systems at Risk

The fourth industrial revolution has failed to address the extraordinary surge in cyberattacks that put manufacturing OT systems and automation at risk.
The post Surge in Cyberattacks Puts Manufacturing OT Systems at Risk appeared first on Nozomi Netwo… Continue reading Surge in Cyberattacks Puts Manufacturing OT Systems at Risk

Bringing network stability and security back to businesses big and small

If you remember the pre-pandemic fun of dining out in a Chinese restaurant, then you probably also know that, at the end of the meal, nobody wants to break open the fortune cookie to read, “May you live in interesting times.” While seemingly a blessing… Continue reading Bringing network stability and security back to businesses big and small

Mixed VLAN tags and BPF syntax

By Richard Bejtlich, Principal Security Strategist, Corelight This post contains a warning and a solution for anyone using BPF syntax when filtering traffic for network security monitoring.  Introduction I have been writing material for the Zeek docume… Continue reading Mixed VLAN tags and BPF syntax

IoT Devices in Different Industries and How to Secure Them

Today, data analytics, automation, connectivity, and remote monitoring have made great progress and have brought innovations in every sphere of modern civilization. The digitization in day-to-day human activities has been revolutionized by the Internet… Continue reading IoT Devices in Different Industries and How to Secure Them

Stop Treating Your Data Center Like a Block Tower

Today, data centers are taking on new shapes and sizes and are existing in all-new locations, from traditional on-site operations to subsea locations with special cooling mechanisms. But one simple fact remains: Securing data centers is vital to any n… Continue reading Stop Treating Your Data Center Like a Block Tower

3 Areas of Your IT Infrastructure that SCM Can Help to Secure

Gone are the days when security teams could focus all of their efforts on keeping attackers out of the network. There’s no inside or outside anymore. The modern network is porous; it allows greater numbers and types of devices to connect to it from all… Continue reading 3 Areas of Your IT Infrastructure that SCM Can Help to Secure