In a panel hosted by BD, three healthcare security professionals discussed the goals and trends of cybersecurity in the field. Eric Decker, Assistant Vice President and...
Ransomware is out of control, with some of the most significant ransomware attacks netting ransoms as high as $40 million. Beyond the immediate financial loss, ransomware...
Federal agencies should seek industry partners that can keep them better informed and offer resources they can’t access. With cybersecurity threats to the federal government increasing...
Online scams are still the biggest cyber threat to African citizens, a new report has revealed, though ransomware attacks are “expanding rapidly” across the continent. The study (PDF), published by...
The National Governors Association (NGA) will support four states — California, Connecticut, Illinois and Utah — as they participate in the nationwide GridEx VI exercise, which reviews and tests energy...
ISO 20000 defines the objective of incident management (part 1, 8.2) as: To restore agreed service to the business as soon as possible or to respond...
Patching is a fact of life for IT administrators. And, although it is essential to maintain security, keeping up with vendors’ patch release cycles is a...
Malware authors often take advantage of vulnerabilities in popular software. But, malware is also prone to bugs and coding errors, causing it to crash and serve...
A new Report, “Ransomware in Focus,” based on a survey of more than 250 Chief Information Security Officers (CISOs), cited ransomware as the #1 threat facing...
Yes, utilities use both IT and OT, but so do data centers. Way back in 2015, I interviewed several officials working at utility companies for a...