article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

These global events have also underscored the crucial significance of safeguarding our critical infrastructure against domestic or foreign attacks. An advanced ID badge system can also track entry and exit times, providing valuable data in the event of a security breach.

article thumbnail

5 tips for securing your remote workspace

CIO

In fact, support for hybrid and remote workers was named as a key reason for increasing IT budgets this year according to Foundry’s 2023 State of the CIO research. This may sound hackneyed, but employees continue to click on malware (according to HP 21% have done so since working from home). Use the tools IT provides.

Malware 264
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why you must extend Zero Trust to public cloud workloads

CIO

It is estimated by the end of 2023, 31% of organizations expect to run 75% of their workloads 2 in the cloud. Why securing cloud workloads is an urgent matter In recent years, major cloud service providers encountered 6,000 malware samples actively communicating with them, underlining the magnitude of cloud security challenges.

Cloud 338
article thumbnail

Learning From the Past — Ten 2022 Cybersecurity Events to Know

Palo Alto Networks

Stepping back to recollect the security events from the recent past is particularly important, as the risk of repeating past mistakes is particularly high. Last year’s most popular posts on the Unit 42 Threat Research blog let us examine what the events of 2022 can tell us about the year to come. Top Malware. Beginning on Jan.

Malware 71
article thumbnail

Google: Monitor These Emerging Cloud Security Challenges in 2023

Tenable

In its latest “Threat Horizons” report, Google’s Cybersecurity Action Team details cloud security trends that it expects will have an impact in 2023 in areas including identity and access management (IAM), data backups and operational technology (OT.). Cloud providers’ IP addresses and open ports targeted with malware.

Cloud 52
article thumbnail

Radar Trends to Watch: July 2023

O'Reilly Media - Ideas

AI Package Hallucination is a new technique for distributing malware. Create malware with that package name, and put it in an appropriate repository. Wait for someone else to get the same recommendation and install the malware. Ask a question that causes an AI to hallucinate a package or library.

article thumbnail

Radar Trends to Watch: June 2023

O'Reilly Media - Ideas

PyPI has been plagued with malware submissions, account takeovers, and other security issues. Microsoft’s cloud services are cracking password protection on.zip files (a relatively easy task) to scan the contents for malware. The FBI was able to use a vulnerability in Russia’s widespread Snake/Uroburos malware to disable it.