article thumbnail

Authorities Unsure if Spain, Portugal Power Outage Was a Cyber Attack

SecureWorld News

The blackout, which began around midday local time, halted public transportation, grounded flights, and disrupted critical services such as hospitals and telecommunications. While the exact cause remains under investigation, authorities have not ruled out the possibility of a cyberattack.

article thumbnail

Cybersecurity Snapshot: Experts Issue Best Practices for Migrating to Post-Quantum Cryptography and for Improving Orgs’ Cyber Culture

Security Boulevard

There’s another PQC standard called Covercrypt from the European Telecommunications Standards Institute (ETSI). Embrace change: Stay attuned to emerging cyber risks and be ready to modify cybersecurity processes accordingly. Show how this capacity to adapt to new cyber threats helps strengthen the organization’s resilience.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Securing Critical Infrastructure Against Cyberattacks

SecureWorld News

officials revealed that the Chinese group Volt Typhoon had maintained undetected access to power grids, ports, and telecommunications providers for as long as five years—long enough to map every breaker, valve, and switch they might someday wish to sabotage. In February, U.S.

article thumbnail

What Is Exposure Management and Why Does It Matter?

Security Boulevard

Security executives: CISOs, business information security officers (BISOs) and other security executives require accurate risk posture assessment to improve investment decisions, make decisions about insurability, meet regulatory and compliance requirements and drive organizational improvement.

article thumbnail

RiskLens Fast Facts on Cyber Risk in the Telecommunications Industry

Security Boulevard

The post RiskLens Fast Facts on Cyber Risk in the Telecommunications Industry appeared first on Security Boulevard. The plaintiffs could be paid up to $25,000 for out-of-pocket losses and $25 an hour for their time dealing with those losses, and receive two years of identity theft protection services.

article thumbnail

Scanning for Flaws, Scoring for Security

Krebs on Security

For years, potential creditors have judged the relative risk of extending credit to consumers based in part on the applicant’s credit score — the most widely used being the score developed by FICO , previously known as Fair Isaac Corporation. Data accidentally released by FICO about the Cyber Risk Score for ExxonMobil.

article thumbnail

Dashboard series: Addressing Exec Leadership Cyber Risk Questions with Balbix

Security Boulevard

One common pain point we hear from our Fortune 1000 customers, like the following from a CISO at a major US-based telecommunications company, is quite revealing- “Now we’ve got activities coming from Leadership, legal, the board of directors, all sorts of people calling and saying, ‘Hey, what’s our cybersecurity posture, our readiness, and what are (..)