Remove industry-news securing-digital-media-assets
article thumbnail

News alert: Security Risk Advisors offers free workshop to help select optimal OT security tools

The Last Watchdog

May 8, 2024, CyberNewsWire — Security Risk Advisors (SRA) announces the launch of their OT/XIoT Detection Selection Workshop, a complimentary offering designed to assist organizations in selecting the most suitable operational technology (OT) and Extended Internet of Things (XIoT) security tools for their unique environments.

Risk 130
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Byron is the founder and editor-in-chief of The Last Watchdog on Privacy & Security. His news analysis columns, podcasts, and videos are crafted to foster a useful understanding of complex privacy and cybersecurity developments for company decision-makers and individual citizens — for the greater good.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security gaps in operational tech exposed with hacker attempt to poison Florida city water

SC Magazine

A malicious hacker’s attempted poisoning of the Oldsmar, Florida water supply serves as a stark reminder of the potentially devastating consequences that can result from operating vulnerable and unsecured industrial controls in a critical infrastructure environment. Oldsmar and Pinellas County, Fla.

CISO 144
article thumbnail

Thales Executives Speak to Press about UK Cybersecurity Developments

Thales Cloud Protection & Licensing

Thales eSecurity’s CTO Jon Geater and Peter Carlisle , Thales eSecurity’s VP of Sales, EMEA, were recently featured in major news outlets espousing their opinions about internet-connected devices and the new Cyber Security Export Strategy. Geater, on new UK IoT security guidelines.

article thumbnail

Colonial Pipeline attack underscores the need for vigilance

SC Magazine

Today’s special columnist, Scott Register of Keysight Technologies, says government and industry must come together to secure the nation’s critical infrastructure in the wake of the Colonial Pipeline hack. Ransomware attacks are nothing new, having been a staple of security headlines for at least half a decade.

article thumbnail

MY TAKE: Why companies and consumers must collaborate to stop the plundering of IoT systems

The Last Watchdog

The good news is that we already possess the technology, as well as the best practices frameworks, to mitigate fast-rising IoT exposures. On the immediate horizon, IoT systems will bring us autonomous vehicles and something called “digital twins” – virtual representations of physical objects infused with artificial intelligence.

IoT 279
article thumbnail

SW Labs | Overview: Attack Surface Management

SC Magazine

In short, products in this category aim to catalogue and help manage an organization’s exposed assets. At its core, Attack Surface Management is asset discovery and management for exposed assets. Performed on a ‘best effort’ basis, penetration tests will also potentially miss vulnerable assets.