Remove Compliance Remove Infrastructure Remove Malware Remove Webinar
article thumbnail

How to manage cloud exploitation at the edge

CIO

The Infrastructure-as-a-Service (IaaS) cloud computing model enables remote working, supports digital transformation, provides scale, increases resilience, and can reduce costs. Cloud infrastructure is especially sensitive, as many critical applications are at risk, such as customer-facing applications. Watch on-demand here.

Cloud 246
article thumbnail

Cybersecurity Snapshot: Critical Infrastructure Orgs Must Beware of China-backed Volt Typhoon, Cyber Agencies Warn

Tenable

The Volt Typhoon hacking gang is stealthily breaching critical infrastructure IT environments so it can strike on behalf of the Chinese government, cyber agencies say. critical infrastructure IT and operational technology security teams, listen up. Critical Infrastructure. ” Plus, ransomware gangs netted $1 billion-plus in 2023.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

ChatGPT and Your Organisation: How to Monitor Usage and Be More Aware of Security Risks

CIO

JPMorgan Chase has limited employees’ usage of ChatGPT due to compliance concerns. While most spam is innocuous, some emails can contain malware or direct the recipient to dangerous websites. And please be sure to watch our on-demand webinar, “ The Rise of AI Like ChatGPT: Is Your Organisation Prepared? Phishing 2.0:

ChatGPT 246
article thumbnail

Unlocking Kubernetes Innovation Through Simplified Cloud Security with Tenable

Tenable

As a CNAPP solution, it analyzes all components of the cloud infrastructure for misconfigurations, vulnerabilities and permissions risk. For example, it assesses Kubernetes clusters for compliance with popular standards and best practices, such as the Center for Internet Security (CIS) Benchmark for Amazon EKS.

article thumbnail

Colonial Pipeline Ransomware Attack: How to Reduce Risk in OT Environments

Tenable

The attack on the 5,500 mile Colonial Pipeline, which supplies 45 percent of the oil and gas used on the East Coast, is just the latest to target the oil and gas sector, which is considered one of 16 critical infrastructure areas identified by the U.S. Regulatory compliance does not equal security. Department of Homeland Security.

article thumbnail

Cybersecurity Snapshot: A Look Back at Key 2023 Cyber Data for GenAI, Cloud Security, Vulnerability Management, OT, Cyber Regulations and more

Tenable

Yes, cyberattackers quickly leveraged GenAI for malicious purposes, such as to craft better phishing messages , build smarter malware and quickly create and spread misinformation. The study found only 21% have GenAI usage policies; only 38% are actively mitigating its cybersecurity risks; and 28% are mitigating its compliance risks.

article thumbnail

Cybersecurity Snapshot: Tips for cloud configs, MSP vetting, CISO board presentations

Tenable

Cybersecurity and Infrastructure Security Agency (CISA) released a set of recommended configuration baselines for the Microsoft 365 product suite. . Cloud Security Roundtable: Scaling Cloud Adoption without Sacrificing Security Standards ” (Tenable webinar). 6 - And here’s the CIS top 10 malware list for September.

Cloud 52