Remove CSO Remove Cyber Attacks Remove Ransomware Remove Risk
article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments.

CSO 52
article thumbnail

Security Roundup October 2023

BH Consulting

Ransomware an ongoing threat to industry as crime gangs organise Malware-based cyber-attacks are the most prominent threat to industry, Europol says. The agency’s spotlight report examines ‘crime-as-a-service’, lifting the cover on ransomware groups’ business structures. Ransomware reminders were plentiful lately.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What does the Colonial Pipeline attack tell us about security today?

IT Security Guru

In May the US Colonial Pipeline shut its operational network after a ransomware cyber-attack. It’s said to be one of the costliest attacks for an economy. New details are emerging about the specifics of the pipeline attack all the time but there are a few concerns that every boardroom must acknowledge.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

In this article we will learn how to address and effectively respond to major enterprise cybersecurity threats and provide tips to mitigate IT security risk. Be On Your Guard with the Most Treacherous Insider Roles A paramount priority when addressing the threat is to distinguish the fundamental insider risks.

article thumbnail

How Machine Identities Can Imperil Enterprise Security

eSecurity Planet

Machine identities now outnumber humans in enterprises, according to Nathanael Coffing, co-founder and CSO of Cloudentity. Gartner’s list of the top security risks and trends for 2021 included machine identity management for the first time. Poor Machine Identity Management Introduces Risks. Machine Identity Risks Go Overlooked.

IoT 119
article thumbnail

Interview with Dr. Arun Vishwanath on the Latest Cybersecurity Attacks

CyberSecurity Insiders

This breach, like every major ransomware attack, was likely because of spear phishing, where someone either received the malware via an emailed attachment or clicked on a link that took them to a website that hosted it. This was how the Sony Pictures ransomware hack also took place in late 2014 and since.

article thumbnail

Cybersecurity Awareness Month: Security Experts Reflect on Safety

CyberSecurity Insiders

Since last October, we have seen enterprises such as SolarWinds, Colonial Pipeline, JBS USA Holdings, Kesaya, Olympus and more become victims of large-scale cyber attacks, causing ripple effects for the companies and their customers. digital infrastructure against frequent and sophisticated attacks.