article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

As the end of 2023 approaches, it becomes imperative to assess the current landscape of cybersecurity threats, explore potential strategies to combat them, and explore the new practice measures that can be taken. As technology advances, so too does the sophistication of threats to these essential systems.

article thumbnail

Aligning security and business strategies

CIO

By Sean Duca, vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks Some economists predict that we could soon face a global recession. When businesses are struggling due to the recession, there’s a strong temptation to look for ways to cut spending.

Security 259
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Securing Azure Service Bus

Xebia

Security should be considered from the initial stages of designing a product rather than as an afterthought. This is particularly important for Service Bus as it often forms a part of a larger system. but due to customer demands for higher security, it now defaults to the higher version. Initially, it was TLS 1.0,

Azure 162
article thumbnail

Averting turbulence in the air

CIO

The diversification of payment methods and gradual increase in the volume of online transactions have cast a spotlight on the need for payment security compliance within the airline industry. With the new, recently onboarded Payment Card Industry Data Security Standard (PCI DSS) v4.0, she wonders. Well not exactly. The PCI DSS v4.0,

Airlines 130
article thumbnail

Cybersecurity Canon Candidate Book Review: Defensive Security Handbook – Best Practices for Securing Infrastructure

Palo Alto Networks

Cyber Canon Book Review: “Defensive Security Handbook – Best Practices for Securing Infrastructure” (2017), by Lee Brotherston and Amanda Berlin. Book Reviewed by: Helen Patton, The Ohio State University CISO. Bottom Line: I recommend this book for the Cybersecurity Canon Hall of Fame.

article thumbnail

Helm.ai snags $31M to scale its ‘unsupervised’ autonomous driving software

TechCrunch

Helm.ai, a startup developing software designed for advanced driver assistance systems, autonomous driving and robotics, is one of them. says it has developed software that can skip those steps, which expedites the timeline and reduces costs; that lower cost also makes it particularly useful for advanced driver assistance systems.

article thumbnail

Cybersecurity Snapshot: Log4j Anniversary, CI/CD Risks, Infostealers, Email Attacks, OT Security

Tenable

It was at around this time last year that the discovery of the zero-day Log4Shell vulnerability in the ubiquitous Log4j open source component sent shockwaves through the worlds of IT and cybersecurity. . 2 - OWASP’s top 10 CI/CD security risks. Insecure System Configuration. How long will this Log4Shell problem linger?