article thumbnail

Cybersecurity Snapshot: Insights on Log4Shell, the Metaverse, IoT, Pig Butchering, Active Directory

Tenable

Get the latest on Log4Shell’s global remediation status; the need for metaverse security rules; a shutdown of “pig butchering” domains; tips for secure IoT products; an informal poll about AD security; and more! . Cybersecurity and Infrastructure Security Agency (CISA). 2 - CISA beefs up critical infrastructure resilience plan.

IoT 52
article thumbnail

Cybersecurity Snapshot: IoT Vendors Fail at Vulnerability Disclosures, While Cyber Threats Again Top Business Risks 

Tenable

Learn all about how most IoT product makers lack vulnerability disclosure policies. Specifically, among 332 IoT product vendors surveyed, only 27% have a vulnerability disclosure policy, even despite an increase in legislation and regulation regarding this issue. Plus, businesses again rank cyber risk as their top concern.

IoT 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Xpirit Innovation Day in Antwerp: March 2022

Xebia

It allows you to introduce chaos in your infrastructure. When you inject chaos in to your infrastructure, you quickly come to realize that you need metrics. IoT Demo – Bas, Kees, Sander, Tijmen, Matthijs, Olena, Arjan With a large group of people we were able to attack the full chain of an Azure IoT Hub based solution.

article thumbnail

Cybersecurity Snapshot: DHS Tracks New Ransomware Trends, as Attacks Drive Up Cyber Insurance Claims and Snatch Variant Triggers Alert

Tenable

3 - Critical infrastructure orgs warned about Snatch ransomware And staying with the ransomware topic, the FBI and CISA are urging cybersecurity teams to prepare to fend off attacks from ransomware group Snatch, which targets critical infrastructure organizations in sectors including defense, agriculture and information technology.

article thumbnail

Cybersecurity Snapshot: Cyber Engineers and Architects Saw Salaries Spike in 2022

Tenable

Also check out the long-awaited security algorithms for IoT devices. To get more details, read the research paper and the lab’s announcement of its findings , as well as coverage from Dark Reading and AI Magazine. Vulnerable infrastructure. Find out how much of a pay bump cybersecurity architects and engineers got.

article thumbnail

Cybersecurity Snapshot: The Latest on Supply Chain Security – SBOM Distribution, Open Source Flaws and a New Security Framework

Tenable

In addition, security worries hold back enterprise IoT adoption. Cybersecurity and Infrastructure Security Agency (CISA) turned its attention to how to better distribute software bills of materials (SBOMs). s main page Check out coverage from SDXCentral , The New Stack and CSO Magazine. And much more! Visit SLSA 1.0’s

article thumbnail

Cybersecurity Snapshot: 6 Things That Matter Right Now

Tenable

7 | CISA puts spotlight on asset inventory and vulnerability management | Think tank does deep dive on IoT security | What’s the current state of cybersecurity? Cybersecurity and Infrastructure Security Agency (CISA) that visibility into all of your IT assets and their vulnerabilities is critical for reducing cyber risk.

IoT 53