article thumbnail

Landmark EU Law Strengthens Cybersecurity of Critical Infrastructures

Palo Alto Networks

The European Union (EU) adopted the revised Network and Information Security Directive (NIS2) in November 2022. It is especially important in a time of growing geopolitical tensions and cyberattacks where European citizens and their economies depend on a stable and secure digital infrastructure.

article thumbnail

Keep the Water Flowing for the DoD: Securing Operational Technology from Cyberattacks

Tenable

Read on to learn how a strong cybersecurity program can help the DoD significantly reduce the cyber risk of its WWS systems. In addition to being attractive targets, these systems are frequently older, lack modern cybersecurity controls and include a range of interconnected systems and technology.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Malware: Bad for business and the environment

Capgemini

However, what happens when that data isn’t secure? The risks of malware. The harsh reality is that malware doesn’t only threaten data security – it can also have a direct impact on sustainability initiatives and impede enterprise climate targets. Sustainable infrastructure warfare.

Malware 52
article thumbnail

Critical infrastructure is more vulnerable than ever—your industry could be a prime target

Lacework

Critical infrastructure is the foundation of our economy, security, and health . Destroying these assets could debilitate national security, the economy, or public health and safety. . For the first time, malware was used to cause physical damage. critical infrastructure sectors , and cybersecurity authorities in the U.S.,

article thumbnail

Radar Trends to Watch: October 2023

O'Reilly Media - Ideas

Security Google, Apple, and Mozilla have reported a severe vulnerability in the WebP image compression library that is actively being exploited. Any sufficiently advanced uninstaller is indistinguishable from malware. Security breaches frequently occur when an employee leaves a company, but retains access to internal apps or services.

article thumbnail

Planbox Achieves Cyber Essentials Certification

Planbox

Cyber Essentials demonstrates Planbox’s commitment to cyber security, and acknowledges that the company has taken the necessary steps to protect against a wide variety of the most common cyber attacks, viruses and malware. Secure Configuration. Malware Protection. Learn more about Security, Trust and Privacy at Planbox.

Malware 52
article thumbnail

Ransomware: The Present We Deserve?

Haft of the Spear

The scourge of ransomware is the inevitable result of decades of schizophrenia about our relationship with information technology and security. You could almost be forgiven for thinking that collectively we – government, industry, and citizens – are finally ready to mobilize against a cybersecurity problem. Über Alles.

Fashion 75