article thumbnail

Turn Out the Lights, the Cyber Attack Is Over. Not Quite

SecureWorld News

This is due to a technical issue connected to the recent cyber attack, when we were forced to shut down our IT systems. First, any organization that uses computers and the internet is a potential target of these attacks; there is no such thing as security by obscurity. Cedric Leighton, CNN Military Analyst; U.S.

article thumbnail

Internet Security Threats at the Olympics

Schneier on Security

Meanwhile, a Russia-linked cyber attack has already stolen and leaked documents from other Olympic organizations. A senior analyst at McAfee warned that the Olympics may experience more cyber attacks before closing ceremonies. EDITED TO ADD: There was already one attack.

Internet 240
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. Read the whole entry. »

article thumbnail

Episode 238: Robots Are The Next Frontier In Healthcare Cyber Risk

The Security Ledger

about his firm’s discovery of a string of critical security flaws in an autonomous medical robot, TUG, that is already deployed in hundreds of clinical settings and the growing issue of medical device insecurity and cyber risks to healthcare. Robots Driving Cyber Risk. Read the whole entry. »

article thumbnail

How to Use Your Asset Management Software to Reduce Cyber Risks

CyberSecurity Insiders

IT asset management aka ITAM counts among the key components of a vigilant, full-fledged security strategy — because it allows your security staff to retain a real-time database of IT assets and the related attack vectors. . Let us now see how you can make the best use of ITAM to minimize cyber attacks.

article thumbnail

Thousands of Data Center Management Apps Exposed to Internet

eSecurity Planet

Tens of thousands of applications that are critical to the operations of data centers around the globe are exposed to the internet, with many secured with default factory passwords, posing a significant cyber risk to enterprises worldwide. This is laziness at its worst.”. See also: Top IT Asset Management Tools for Security.

Internet 117
article thumbnail

Safer Internet Day: The importance of training employees to keep organizations safe

CyberSecurity Insiders

Safer Internet Day is a reminder for organizations to train and regularly refresh employee awareness around cybersecurity. With regular headlines of the latest cyber-attack occurring, organizations must focus on cybersecurity and using the internet safely. Remote working risks. Using varied eLearning techniques.