The Next Disruptive ICS Attacker: A Disgruntled Insider?

Often, the most critical threats come from within an organization itself. This is true for all sectors, but it is especially true for industrial control systems (ICS). Technicians in these environments already have access to plant controls and may have… Continue reading The Next Disruptive ICS Attacker: A Disgruntled Insider?

An Unexpected Cost-Saving Tool for Software Contract Negotiation Management

One of the things that makes DTEX Systems solutions so effective for Insider Threat detection and DLP is that they reveal – in scrupulous detail – who in your organization is using which software products on which devices.
The post An Unexpected Cost-S… Continue reading An Unexpected Cost-Saving Tool for Software Contract Negotiation Management

Report Finds Software Supply Chains Rife with Vulnerabilities

A report published today by application security testing tool provider GrammaTech in collaboration with Osterman Research suggests just about every software supply chain is rife with vulnerabilities. An analysis of commercial off-the-shelf (COTS) appl… Continue reading Report Finds Software Supply Chains Rife with Vulnerabilities

Gartner Recognition: When it Rains, it Pours…

As a co-founder of Cequence, I get the pleasure of seeing firsthand how our products help our customers protect their APIs from malicious attacks that can lead to fraud and data loss. However, the challenge any small company has is getting the word out… Continue reading Gartner Recognition: When it Rains, it Pours…

Italian Vaccine Sites Shut Down by Ransomware Thugs

Some Italian healthcare websites and their backroom systems have been wiped off the internet by malware.
The post Italian Vaccine Sites Shut Down by Ransomware Thugs appeared first on Security Boulevard.
Continue reading Italian Vaccine Sites Shut Down by Ransomware Thugs

Why Would Someone Hack My Website?

Website hacking has become very common, regardless of the size, scale, or nature of the organizations. Hackers are stealing 75 records per second and creating 300,000 new pieces of malware.
The post Why Would Someone Hack My Website? appeared first on … Continue reading Why Would Someone Hack My Website?

What the Growing Costs of a Data Breach Means for the Business

A recent global research report conducted by Cybereason, titled Ransomware: The True Cost to Business, revealed that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, in… Continue reading What the Growing Costs of a Data Breach Means for the Business

Ransomware Attacks Leave Lasting Damage

Organizations hit by ransomware attacks also report tightened budgets and lingering impacts on productivity, profitability and security posture, suggesting the extensive damage caused in the wake of ransomware attacks has long-lasting effects. A Keepe… Continue reading Ransomware Attacks Leave Lasting Damage

U.S., UK and Australia Issue Joint Cybersecurity Advisory

As vulnerabilities are discovered, advisories are issued, remedies and mitigations are shared and then the onus is on the end user and/or company to do what’s necessary to close the window into their infrastructure. That is what happens in a per… Continue reading U.S., UK and Australia Issue Joint Cybersecurity Advisory

Estonian Hacker Steals 300,000 Government ID Photos

Estonia’s electronic ID system was hacked last week. Again. A suspect is in custody.
The post Estonian Hacker Steals 300,000 Government ID Photos appeared first on Security Boulevard.
Continue reading Estonian Hacker Steals 300,000 Government ID Photos