article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. What hasn’t gained as much public attention is a secondary level of cyber attacks that surges every time the hacking community uncovers a fresh vulnerability.

article thumbnail

Cactus ransomware gang claims the Schneider Electric hack

Security Affairs

Energy management and industrial automation firm Schneider Electric suffered a data breach after a Cactus ransomware attack. Schneider Electric is a multinational company that specializes in energy management, industrial automation, and digital transformation. The Cactus ransomware relies on multiple legitimate tools (e.g.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cactus ransomware gang claims the theft of 1.5TB of data from Energy management and industrial automation firm Schneider Electric

Security Affairs

Schneider Electric is a multinational company that specializes in energy management, industrial automation, and digital transformation. In January, BleepingComputer first reported the attack that hit the Sustainability Business division of the company on January 17th.

article thumbnail

Top of Mind Security Insights from In-Person Interactions

Cisco Security

Attacks are becoming more bespoke, government-sponsored threat actors and ransomware as a service, continue to unravel challenging businesses to minimize the time from initial breach to complete compromise, in the event of a compromise. . Digital transformation and Zero Trust . Everyone is an insider .

article thumbnail

Spotlight: Traceable CSO Richard Bird on Securing the API Economy

The Security Ledger

APIs, today, are everywhere – they’re the foundation of digital transformation initiatives: allowing organizations exchange of data and instructions seamlessly between applications – many hosted in cloud environments. APIs abused in cyber attacks But APIs can also facilitate cyber attacks and the theft of data.

CSO 52
article thumbnail

The Growing Importance of Cybersecurity in California’s Healthcare Industry

Cytelligence

The healthcare industry has witnessed a rapid digital transformation, with hospitals, clinics, and medical practices relying heavily on technology to store and manage patient data, streamline operations, and improve patient care. Patient records, insurance information, and intellectual property are just a few examples.

article thumbnail

NEW TECH: Devolutions’ ‘PAM’ solution helps SMBs deal with rising authentication risks

The Last Watchdog

A 2018 Cisco Cybersecurity Special Report found that 54 % of all cyber attacks cost the target company more than $0.5 However, smaller companies rarely have the IT talent, tools, or budget to prevent such attacks. However, smaller companies rarely have the IT talent, tools, or budget to prevent such attacks.