article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

These global events have also underscored the crucial significance of safeguarding our critical infrastructure against domestic or foreign attacks. It’s easy to envision the outcomes that could arise from a major assault on our vital infrastructure.

article thumbnail

How to manage cloud exploitation at the edge

CIO

The Infrastructure-as-a-Service (IaaS) cloud computing model enables remote working, supports digital transformation, provides scale, increases resilience, and can reduce costs. Cloud infrastructure is especially sensitive, as many critical applications are at risk, such as customer-facing applications. Watch on-demand here.

Cloud 246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 5 Security Trends for CIOs

CIO

With every such change comes opportunity–for bad actors looking to game the system. Sometimes they simply don’t work, perhaps due to a change in contact lenses or a new tattoo. A second, more pernicious risk is the fact that ChatGPT can write malware. The malware itself is easy to buy on the Dark Web. And how do you tell?

Trends 317
article thumbnail

Cybersecurity Snapshot: Critical Infrastructure Orgs Cautioned About Chinese Drones, While Water Plants Advised To Boost Incident Response

Tenable

Find out why Uncle Sam is warning critical infrastructure facilities about drones made in China, while urging water treatment plants to beef up incident response plans. In addition, the latest on the Androxgh0st malware. 1 - Critical infrastructure orgs warned about using Chinese drones Here’s a warning from the U.S.

article thumbnail

Tenable OT Security: 2023 Year in Review

Tenable

Whether an attack originates within the IT or the OT infrastructure is almost beside the point; what matters is that any cyberattack has the potential to disrupt business operations. In our view, protecting your OT environment requires a holistic view of all parts of the infrastructure. Let’s use a factory as an example.

article thumbnail

FBI and CISA Release Cybersecurity Advisory on Royal Ransomware Group

Tenable

Background As part of their #StopRansomware campaign, the Federal Bureau of Investigation and Cybersecurity and Infrastructure Security Agency have released a cybersecurity advisory (CSA) discussing the Royal ransomware group. Royal uses Cobalt Strike and malware such as Ursnif/Gozi to exfiltrate data.

Groups 96
article thumbnail

Improving visibility and security in hybrid cloud environments

CIO

It’s a reminder that without a clear view of our data and systems, we’re leaving ourselves vulnerable to all sorts of risks. Studies have shown that over half of organizations struggle with the lack of visibility into their infrastructure security. That’s where centralized visibility comes in. But it doesn’t stop there.

Cloud 246