article thumbnail

GUEST ESSAY: Best practices to shrink the ever-present risk of Exchange Server getting corrupted

The Last Watchdog

One critical issue faced by organizations that rely on Exchange Server is the risk of a corrupt Exchange Server database cropping up. Navigating new risks Today, heavy reliance on cloud-centric IT infrastructure and cloud-hosted applications has become the norm. Here are a few ‘dos:’ •Rigorous vulnerability management.

Risk 264
article thumbnail

GUEST ESSAY: Where we stand on mitigating software risks associated with fly-by-wire jetliners

The Last Watchdog

Here’s what you should know about the risks, what aviation is doing to address those risks, and how to overcome them. It is difficult to deny that cyberthreats are a risk to planes. Risks delineated Still, there have been many other incidents since. Fortunately, there are ways to address the risks.

Software 264
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Drilling Rigs in deepwater are vulnerable to Cyber Attacks

CyberSecurity Insiders

A study conducted by a cybersecurity firm named Naval Dome has discovered that most of the drilling rigs operating in deep waters are vulnerable to cyber attacks. Naval Dome researchers found in their two-year-old study that various companies involved in oil business were mitigating cyber risks with great care.

article thumbnail

GUEST ESSAY: A primer on Biden’s moves to protect U.S. water facilities from cyber attacks

The Last Watchdog

As the US federal government begins to put its eye on securing more of its infrastructure against the rising risk of large-scale cybersecurity attacks, a late January statement from the White House has put its eye on securing water facilities. This means water districts and municipalities sharing reservoirs also share risks.

article thumbnail

CFOs ignoring billions of dollars loss incurred through Cyber Risks

CyberSecurity Insiders

Chief Financial Officers aka CFOs are ignoring billions of dollars loss incurred through cyber risks and threats, says a survey. So, experts want the CFOs to stay in a loop with the board to understand the risks and severity involved in cyber attacks.

article thumbnail

RSAC insights: Security platforms arise to help companies discover, assess and mitigate cyber risks

The Last Watchdog

As their organizations migrate deeper into an intensively interconnected digital ecosystem, CISOs must deal with cyber attacks raining down on all fronts. Employees using their personally-owned smartphones to upload cool new apps presented a nightmare for security teams. The third capability has to do with mitigating risks.

article thumbnail

Survey expects an increase in Cyber Attacks from North Korea

CyberSecurity Insiders

A survey taken up by CrowdStrike has confirmed that there would probably be an increase in cyber attacks from North Korea as the nation is struggling with economic crisis and food shortage in the nation because of the corona-virus pandemic.