Security Think Tank: Attacks on CNI – an evolving frontier in warfare

By Published: 23 Mar 2021 The recent attack on the Oldsmar, Florida water treatment facility, where sodium hydroxide was applied to water at life-threatening levels, as well as previous attacks such as the 2015 Ukraine power grid cyber... Read more »

$50m ransomware demand on Acer is highest ever

A $50m ransomware demand made against PC manufacturer Acer by the REvil/Sodinokibi cyber crime syndicate appears to be the highest ever made. Details of the record-breaking double-extortion cyber attack... Read more »

Security Think Tank: Back to square one – ground-up CNI protection

In the wake of successful or thwarted security incidents that have made the news, similar patterns of response can be seen time and again. More so when it comes... Read more »

10 leading incident response vendors for 2021

When it comes to dealing with an unplanned and potentially disruptive event that affects the security and integrity of an organization’s IT infrastructure, incident response plans are the first... Read more »

Security Think Tank: Properly protecting CNI demands specificity

When we think of critical national infrastructure (CNI), we tend to think of industries such as power, water and transport, and although CNI also includes communications and finance, it... Read more »

Vaccine passports cannot put basic rights at risk, warns BCS

The creation and use of portable, digital vaccine passports risks endangering basic rights, and could easily result in a situation where everyday activities such as browsing in a shop... Read more »

Top incident response tools to boost network protection

As the rate of cybersecurity incidents grows, security teams are looking for all the help they can get to prevent, detect and respond to attacks. Many organizations are understaffed... Read more »

How attackers counter incident response after a data breach

Cyber attacks are one of the biggest threats facing organizations today, particularly during the COVID-19 pandemic. A large contingent of the workforce now works from home, new devices are... Read more »

Endpoint security vs. network security: Why both matter

When it comes to developing a comprehensive cybersecurity strategy, no single architecture type or product can protect against all threats. Instead, an assortment of security tools must be deployed... Read more »

Building an incident response framework for your enterprise

Incident response coordinates approaches to manage cyber incidents and fallout to limit the consequences. Incident response frameworks guide the direction and definition of response preparedness, planning and execution by... Read more »
Subscribe to our Newsletter