Tag: Threat Landscape
-
The Importance of OT Security: The Evolving Threat Landscape – Ken Townsend – CSP #170
Manufacturing environments rely heavily on Operational Technology (OT) systems – such as industrial control systems, supervisory control, …
-
Cybersecurity for Healthcare—Diagnosing the Threat Landscape and Prescribing Solutions for Recovery
On Thanksgiving Day 2023, while many Americans were celebrating, hospitals across the U.S. were doing quite the …
-
Second Half of 2023 Threat Landscape Dominated by AI and Android Spyware
The threat landscape has been bustling in the second half of 2023, according to cybersecurity provider ESET. In its Threat …
-
11th Edition of the ENISA Threat Landscape Report 2023: Top Findings
Some of the key aspects of the threat landscape that the report seeks to capture include: Top cybersecurity …
-
Safeguarding Data in a Rapidly Evolving Threat Landscape: Importance of DSPM
In the contemporary digital era, data has developed into a priceless resource for businesses across all industries. However, with the rapid …
-
Pernicious Rootkits Pose Growing Blight On Threat Landscape
In recent weeks, attackers have leveraged workarounds that let them sign malicious kernel drivers, dealing a multi-pronged threat to …
-
API Security: Navigating the Threat Landscape
An Application Programming Interface (API) is an essential and ubiquitous software that allows the exchange of information between …
-
Reshaping the Threat Landscape: Deepfake Cyberattacks Are Here
It’s time to dispel notions of deepfakes as an emergent threat. All the pieces for widespread attacks are in place and readily available to …
-
Mimecast: Mitigating Risk Across a Complex Threat Landscape
Garret O’Hara of Mimecast discusses how companies can bolster security of their Microsoft 365 and Google Workspace environments, since …
-
The Return of LOIC, HOIC, HULK, and Slowloris to the Threat Landscape
In June 2021, I wrote a blog questioning if decade-old denial-of-service tools were still relevant. At the time, I had concluded that while …
-
Rethinking Vulnerability Management in a Heightened Threat Landscape
Repeated warnings from CISA and the Biden Administration on the Russian cyber threat over the last several months have heightened the state …
-
The Four Pillars of a Cybersecurity Strategy That Works
Understanding the threat landscape is one thing; extracting and leveraging actionable threat intelligence to reinforce an organization’s …
●●●