How the Past 6 Months Have Shaped ICS Risk

During the past year, there has been heightened awareness of the risks posed by industrial control system (ICS) vulnerabilities, with researchers and vendors focusing on identifying and remediating these vulnerabilities as effectively and efficiently … Continue reading How the Past 6 Months Have Shaped ICS Risk

Myth #4: Real-Time Visibility Is Impossible

This is part 4 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read myth #3 here. The levels of manual effort put in by security teams involved in reducing risk and… Continue reading Myth #4: Real-Time Visibility Is Impossible

Pandemic Pushes Security Analysts to the Brink

Even when times are good, security analysts working in Security Operations Centers (SOCs) are up against it. They must stay on top of a rising tide of ever-changing threats, knowing all the while they will be first in the firing line if ever a breach … Continue reading Pandemic Pushes Security Analysts to the Brink

Pandemic Burnout: Yes, It’s a Thing. And It’s a Security Risk

Although not a medical diagnosis, job burnout is a real physical and emotional condition, causing such symptoms as extreme fatigue, lack of job satisfaction, apathy, anxiety, depression, decreased concentration and lowered productivity. In 2019, the W… Continue reading Pandemic Burnout: Yes, It’s a Thing. And It’s a Security Risk

Which security measures would be helpful for running executables from a mathematically-safe range? Do I need to take any?

I’m going to be searching within byte range 90,000 – 99,999, explicitly for executables. Each found will be executed on the same system before the next jump. If execution is successful, the file will be retained for further inspection at a… Continue reading Which security measures would be helpful for running executables from a mathematically-safe range? Do I need to take any?

A Recipe for Reducing Medical Device Internet of Things Risk

You may recall this blog post from March 2020. It highlighted the importance of factoring in clinical, organizational, financial and regulatory impact when determining which medical Internet-of-Things (IoMT) security vulnerabilities should be fixed first. Consider this post a part two. Whereas the previous post focused on the fact that IoMT devices are here to stay […]

The post A Recipe for Reducing Medical Device Internet of Things Risk appeared first on Security Intelligence.

Continue reading A Recipe for Reducing Medical Device Internet of Things Risk

Today’s Risk Assessment Goes Beyond Prediction to Intelligence

Risk assessment helps organizations identify, reduce and manage risks to prevent their re-occurrence. To do this, they need to spend a large amount of their IT budget on technologies and processes to find and assess those risks, determine their impact and spend considerable effort to fix them.   Additionally, the increased reliance on third-party vendors to provide […]

The post Today’s Risk Assessment Goes Beyond Prediction to Intelligence appeared first on Security Intelligence.

Continue reading Today’s Risk Assessment Goes Beyond Prediction to Intelligence