Chernobyl’s lessons for critical-infrastructure cybersecurity

The Parallax

The operators were not informed of this and were not aware that the test performed could have brought the reactor into an explosive condition. There were at least two other cybersecurity incidents at U.S. Layered security to stop hackers. Cybersecurity holes still remain.

K-12 Data Security Tips from PowerSchool’s Chief Information Security Officer

PowerSchool

By Rich Gay, Chief Information Security Officer & VP of Development , PowerSchool . No school or district can be 100 percent safe from cybersecurity attacks. Las t year alone, there were 122 data security incidents reported at K-12 schools, according to a recent report by the K-12 Cybersecurity Resource Center. The good news is that there are many ways to be proactive and secure your student and staff information.

Information Security Spending: Don’t Be Fooled by Overconfidence

The New Stack

Spending on information security continues to increase, but those gains may decelerate as companies become more confident in their security posture. Sentiment about security may be due to increased spending in previous years.

Q&A with John Masserini, Chief Information Security Officer at Millicom

Sailpoint

In this Q&A we spoke with John Masserini, chief information security officer at international telecommunications provider Millicom. Masserini talks with us about his interesting career path in information security, cloud security, and identity management.

The Ultimate Embedded Analytics Guide

Triaging modern medicine’s cybersecurity issues

The Parallax

Hackers often talk about practicing good “cybersecurity hygiene” : making sure that basic standards, such as using unique passwords for each log-in, are met. ”—Jacki Monson, chief privacy and information security officer, Sutter Health. READ MORE ON MEDICAL SECURITY.

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

In the past few weeks, we’ve discussed patch management and using vulnerability scanning to see what vulnerabilities are in your infrastructure, and then we dove into the importance of data backups , as well as passwords and policies such as using MFA and proactively identifying compromised passwords to help secure your infrastructure. This is not good security practice. Standardizing secure configurations. Can you believe it’s already May?

Proactively Identifying Compromised Passwords | Roadmap to Securing Your Infrastructure

Linux Academy

Happy Monday, and welcome back to Roadmap to Securing Your Infrastructure. As this week’s title suggests, we’re going to identify how we can be proactive in identifying compromised passwords in an effort to head off attackers using them to breach our infrastructures.

Leading Cybersecurity Officials Keynote GovEdge 2019

Tenable

Vulnerability management was the centerpiece of Tenable’s public sector user conference, where cybersecurity and government leaders came together to explore ways to close their Cyber Exposure gap.

How Should CIOs Handle More Cybersecurity Regulations?

The Accidental Successful CIO

As our companies understand the importance of information technology and acquire more and more valuable information, the bad guys keep trying to find ways to break in and steal customer credit card and personal information.

Why “Build or Buy?” Is the Wrong Question for Analytics

What’s more, they gain the security of working with. infrastructure isn’t set up to scale with increased. informed decisions. workflows and security models. WHY “BUILD OR BUY?” IS THE WRONG QUESTION FOR ANALYTICS Introduction.1 When to Build Your Own Analytics.

Why Consider IT Infrastructure Managed Services

Trigent

Most of the time IT organizations are caught up with managing complex IT infrastructure environments and the whole process of planning, building, running and maintaining IT makes it difficult to think of much else. cloud-based IoT infrastructure

June Content | Security in Infrastructure

Linux Academy

WPA2 was a quality, secure Wi-Fi, right? We’ll discuss that point and the new WPA3 in next week’s post about wireless security. Here are the content and topics we’ll cover in June: WPA3 and the New Security Benefits. ” The Security of Adding Self-Audits.

April Intro | Roadmap to Securing Your Infrastructure

Linux Academy

Why do I bring up car care when this is an information security blog? The same holds true for our infrastructures, which means we should have a National Infrastructure Care Awareness Month, and it should be EVERY month! More secure passwords. Security challenges.

What is Critical Infrastructure and How Should We Protect It?

Tenable

We hear a lot these days about critical infrastructure, and the importance of protecting it. But what exactly is “critical infrastructure,” what are the greatest threats to it, and what are the best ways to protect it from those threats? . What is Critical Infrastructure? .

The Bill Codifying The New Cybersecurity and Infrastructure Security Agency Is Short and Sweet

CTOvision

The Cybersecurity and Infrastructure Security Agency (CISA) was created out of several existing organizations within the DHS. CTO Cyber Security NewsThe nation has a new federal agency. The CISA was codified by a law signed by the President on 16 November 2018. I read what DHS said about CISA (see more here). Then thought I should spend a […].

Wireless Security | Roadmap to Securing Your Infrastructure

Linux Academy

Wireless security is not only a huge subject, but it’s also extremely important. It was patched quickly but this raised wireless security questions about WPA2. This is a great example of being proactive in security. Six Tips for Upgrading Your Wireless Security.

Backups | Roadmap to Securing Your Infrastructure

Linux Academy

As information security professionals, it may not be our job to manage system backups, but it is our job to realize the importance backups have in the realm of information security. From a security standpoint, what should we consider when looking at backups?

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

In the past few weeks, we’ve discussed patch management and using vulnerability scanning to see what vulnerabilities are in your infrastructure, and then we dove into the importance of data backups , as well as passwords and policies such as using MFA and proactively identifying compromised passwords to help secure your infrastructure. This is not good security practice. Standardizing secure configurations. Can you believe it’s already May?

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

In the past few weeks, we’ve discussed patch management and using vulnerability scanning to see what vulnerabilities are in your infrastructure, and then we dove into the importance of data backups , as well as passwords and policies such as using MFA and proactively identifying compromised passwords to help secure your infrastructure. This is not good security practice. Standardizing secure configurations. Can you believe it’s already May?

Roadmap to Securing Your Infrastructure: Intro

Linux Academy

This is the year we take information security to the next level. The next level is taking a journey with me throughout 2019 to discuss many different ways you can increase the security of your infrastructure. Each week, we’ll be posting about options to secure your infrastructure, and once monthly we’ll be posting a video to go along with one of the months topics. Securing Your Infrastructure. Holy cow — it’s 2019!

The New Infrastructure Automation: Continuous Cost Control

ParkMyCloud

As applications and systems have evolved from single-host mainframes to distributed microservices architectures, infrastructure automation has become a key part of the toolkit for modern sysadmins and operations teams.

Roadmap to Securing Your Infrastructure

Linux Academy

As an information security professional, I’m often asked, “What can I do to make my company safe from cyber threats?” Unfortunately, there is no pixie dust to sprinkle around and make everything secure. However, there are many steps you can take to secure your environment, putting you at an elevated security posture. Roadmap to Securing Your Infrastructure is a year-long, weekly blog series that will discuss many of the ways you can secure your infrastructure.

March Intro | Roadmap to Securing Your Infrastructure

Linux Academy

March is upon us as we continue with our roadmap to securing your infrastructure. Hopefully, February’s posts reignited your passion for security. In the information security industry, one thing we cannot do is become stagnant. The security mindset.

Windows Event Log Types | Roadmap to Securing Your Infrastructure

Linux Academy

When it comes to security, the more information we have, the more easily we can pinpoint malicious activities. Keeping track of all of this information requires security logging. Security Event Logging. Security group changes.

How companies adopt and apply cloud native infrastructure

O'Reilly Media - Ideas

Survey results reveal the path organizations face as they integrate cloud native infrastructure and harness the full power of the cloud. How Companies Adopt and Apply Cloud Native Infrastructure. Types of cloud infrastructure used by survey respondents.

Mueller’s indictment of election hackers a cybersecurity ‘wake-up call’

The Parallax

As Dave Aitel, former NSA cybersecurity analyst and the current chief security technical officer of cybersecurity company Cyxtera tells The Parallax, the details of the indictment indicate the high level of confidence the Justice Department has in its charges. Regardless of U.S.

NSA leader to hackers: Cybersecurity’s a team sport

The Parallax

LAS VEGAS—It wasn’t so long ago that DefCon attendees enthusiastically engaged in the conference pastime “ Spot the Fed ”—clearly separating themselves from employees of federal organizations like the National Security Agency, if not demonizing them. Cybersecurity really is a team sport.

Sport 163

Top 5 Reasons to Stick With a Hybrid Cloud Infrastructure

Storagecraft

For many SMBs, it’s practical to use a private cloud for everything from software as a service to storage infrastructure and more. Read more » The post Top 5 Reasons to Stick With a Hybrid Cloud Infrastructure appeared first on StorageCraft Technology Corporation.

Israel’s cybersecurity industry is a unicorn. Here’s why

The Parallax

Fewer attendees, perhaps, expected him to reference the Hollywood action movies of Jean-Claude van Damme, who happened to be sitting in the front row for the highest-profile speech of Israel’s largest cybersecurity conference. Cybersecurity is a true blood sport,” Netanyahu quipped.

Infrastructure as Code: Evolution and Practice

The New Stack

Sean is a seasoned systems operator and software developer with a decade of experience in automating infrastructure. As infrastructure has evolved and matured over the last decade, the way in which we build and deploy that infrastructure has — for the most part — kept pace.

Customers Need a Hyper-Converged Infrastructure For a Resilient, Adaptive Cybersecurity Strategy – Partners Can Help

Armughan Ahmad - Dell EMC

In 2017, there were more than 5,000 publicly disclosed data breaches, according to Risk-Based Security. The implementation of sweeping regulations, as well as the damaging effects of financial penalties and brand reputation, have elevated the need to protect and secure data.

Why Serverless Is the Uber of Infrastructure

The New Stack

Serverless, the latest evolution of computing power, allows engineering to operate think about infrastructure in the same way a ride-share user thinks about cars: in short, they do not. Companies don’t move to the cloud solely to save money on infrastructure though.

Network Awareness Using ARPwatch | Roadmap to Securing Your Infrastructure

Linux Academy

Check out the previous articles in Securing Your Infrastructure : Security Awareness Training | Vulnerability Scanning | Patch Management | Data Backups | User Account Review.

What's an infrastructure pro to do in a DevOps world?

TechBeacon

By the time I had spent 20 years in infrastructure, I thought I knew how it all worked. Then it usually gets harder—to scale, maintain, or secure—so it gets handed over to the infrastructure team.