article thumbnail

The 7 Biggest Cybersecurity Scoops from February 2015

SiteLock

Fast forward to 2015, and we’ve had several trending cyber security issues appear in just these first few weeks. Below are 7 trending cyber security stories that you should read for February 2015. Anthem Cyber Attack. Internet Explorer Vulnerability Discovered. The Internet of Things and Cyber Security.

article thumbnail

Episode 162: Have We missed Electric Grid Cyber Attacks for Years? Also: Breaking Bad Security Habits

The Security Ledger

» Related Stories Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec Episode 159: Deep Fakes and Election (in)Security with ZeroFOX Spotlight Podcast: Rethinking Your Third Party Cyber Risk Strategy. If you believe the headlines, the first known disruptive cyber attack against the U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

Chris and I talk about how organizations that manage OT – including critical infrastructure owners – are being targeted by sophisticated cyber actors and the strategies best suited to manage increased cyber risks to OT environments.

CSO 59
article thumbnail

Episode 232: Log4j Won’t Go Away (And What To Do About It.)

The Security Ledger

Related Stories Spotlight: How Secrets Sprawl Undermines Software Supply Chain Security Episode 227: What’s Fueling Cyber Attacks on Agriculture ? In the meantime, threat actors are scanning the Internet to identify servers vulnerable to exploitation. Read the whole entry. » » Click the icon below to listen.

article thumbnail

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

» Related Stories Episode 205 – Google’s Camille Stewart: InfoSec’s Lack of Diversity is a Cyber Risk Encore Edition: Veracode CEO Sam King on Infosec’s Leaky Talent Pipeline Deere John: Researcher Warns Ag Giant’s Site Provides a Map to Customers, Equipment. Read the whole entry. » And on and on.

article thumbnail

Achieving PCI DSS Compliant Firewalls within a Small Business

Security Boulevard

Firewalls are used to segment or isolate networks and are an essential component to limit cyber threats and protect internal networks from the internet and untrusted networks. Establish firewalls at each Internet connection between the DMZ and the local network. What is a PCI DSS Compliant Firewall?

article thumbnail

WordPress and the Dark Side of Defacements

SiteLock

Regardless of whether your website is a personal blog, a small eCommerce site, or a corporate business, you are at risk of a cyber attack. WordPress remains the largest CMS and holds a large market share of the internet. Install a WAF to protect your website from any future cyber attacks or malicious attempts.