article thumbnail

Zero Trust: Hype vs. Reality

eSecurity Planet

Just as the development of cannons and other weapons made walls obsolete as a form of defense, sophisticated cyber attacks have made the firewall -perimeter model of cybersecurity equally obsolete. Defense in Depth 2000 vs 2020. The old castle-and-moat IT architecture no longer fits our reality. Why Zero Trust Matters.

article thumbnail

Securing industrial networks: What is ISA/IEC 62443?

Cisco Security

Cyber attacks targeting industrial networks increased by 2000% from 2018 to 2019. Attacks on operational technology (OT) can interrupt production and revenue, expose proprietary information, or taint product quality. They can even put employees in harm’s way or damage the environment.

IoT 89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

I held this position from 2000 through 2014, during which time Windows emerged as a prime target for both precocious script kiddies and emerging criminal hacking rings. Kapczynski Erin: Could you share your thoughts on the role of artificial intelligence, machine learning and the growth of IoT devices in both cyber defense and cyberattacks?

article thumbnail

Customer Q and A: Advantasure Developers Talk AppSec

Security Boulevard

I think it starts with architecture. In the early 2000???s Go through the process a cyber-attacker would. s still carryover from that time where a lot of developers came in focused on code and logic and all the rest of it, and they think of security as a side aspect or something to clean up at the end, like documentation.

article thumbnail

Customer Q and A: Advantasure Developers Talk AppSec

Veracode Security

I think it starts with architecture. In the early 2000???s Go through the process a cyber-attacker would. s still carryover from that time where a lot of developers came in focused on code and logic and all the rest of it, and they think of security as a side aspect or something to clean up at the end, like documentation.