article thumbnail

SANS Outlines Critical Infrastructure Security Steps as Russia, U.S. Trade Cyberthreats

eSecurity Planet

Williams urged viewers to focus on the basics, like phishing , passwords and patching /updating, as those are still the entry point of many attacks. Inventory B2B VPNs and block all high-risk protocols (see slide below). Inventory B2B VPNs and block all high-risk protocols (see slide below). Plan for rapid containment.

B2B 122
article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

More robust security for Domain Name Systems (DNS). Still, how does the adoption of cryptocurrency as a form of consumer or B2B payment impact business processes and cybersecurity? Attack vectors like phishing , third-party applications, and compromised registration forms remain the most pertinent to crypto traders.