The interconnectedness of medical devices, which generate data that can be distributed to multiple systems that are often managed by different policies, presents privacy concerns that device manufacturers must address, said Adam Hesse, CEO of Full Spectrum.
A new artificial intelligence-based protection system developed by the German government-funded SecDER project is revolutionizing the security of virtual power plants by detecting cyberattacks and predicting failures, according to Fraunhofer SIT Institute Darmstadt.
The deployment of an asset management platform is helping Main Line Health gain deeper visibility and better security over the 100,000-plus medical devices and IoT gear used throughout the group's multiple hospitals and medical facilities, said CISO Aaron Weismann, who discusses the implementation.
Multiple critical vulnerabilities in Emerson Rosemount 370XA gas chromatographs could allow malicious actors to access sensitive data, cause denial-of-service conditions and execute arbitrary commands. Emerson recommends that end users update the firmware on the products.
Digital innovation, cloud adoption, and the shift to a hybrid workforce have fundamentally transformed the network. As organizations increasingly rely on cloud-based resources, such as SaaS applications, the
need for a new approach to secure network access — especially the challenges of implicit trust inherent in...
Theresa Lanowitz, head of evangelism and research at AT&T Cybersecurity, discusses key insights from the latest cybersecurity report. Security leaders need balanced investing, more internal collaboration and better preparation for potential cyberthreats to improve enterprise security, she said.
Enterprise IoT - it's long been considered the weakest link in network security. But David Aspinall of Palo Alto Networks has new strategies and solutions for addressing the unique challenges of securing this expanding army of connected devices.
Half a dozen vulnerabilities in a moderately priced Netgear router could allow attackers to bypass authentication, putting home users and small businesses at risk. The flaws could cause unauthorized access, network manipulation and exposure of sensitive data.
Anthony Perry, director IT and OT/IoT security at FedEx, shared strategies for developing robust OT security programs. At FedEx, the focus on OT and IoT security has grown over the past several years, driven by the need to protect the company's automation processes, Perry said.
The OT attack surface has evolved considerably over the past several years - as have tailored risks and threats. Del Rodillas of Palo Alto Networks outlines the broad variety of OT security use cases in modern environments, as well as how to address them with a common framework and architecture.
Among the greatest threats to healthcare entities is the inherent insecurity of connected medical devices. But is device security funded like the priority it is? Tapan Mehta of Palo Alto Networks opens up on the latest threats, defenses and regulatory trends.
Networking solutions vendor Zyxel fixed critical vulnerabilities in end-of-life network-attached storage devices that allow remote code execution. It left two vulnerabilities allowing attacks by authenticated local attackers unpatched.
A gaming Wi-Fi router contained a zero-day that allowed a remote unauthenticated attacker to execute arbitrary code - a flaw that a static analysis cybersecurity firm attributed to insecure coding practices. Routers are a perennial source of risk to enterprises and home users alike.
Defenders of operational technology environments should look beyond the technical controls and incident response plans they've put in place. They also need to consider how attackers might undermine confidence in the service itself, says Ian Thornton-Trump, CISO of Cyjax.
Multiple Chinese cyberespionage groups, including Volt Typhoon, are using operational relay box networks, aka ORBs, built using leased proxy servers and compromised or end-of-life routers, to avoid detection and complicate efforts to track their activities, warns Google Cloud's Mandiant.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.