Tata Power Company Limited, India's largest integrated power company, on Friday confirmed it was targeted by a cyberattack. The intrusion on IT infrastructure impacted "some of its IT systems," the company said in a filing with the National Stock Exchange (NSE) of India. It further said it has taken steps to retrieve and restore the affected machines, adding it put in place … [Read more...] about Indian Energy Company Tata Power’s IT Infrastructure Hit By Cyber Attack
Cyber
Cyber Insurance and the Attribution Conundrum
Written by Martin Lee and Richard Archdeacon. Lloyds of London have recently published a Market Bulletin1 addressing the wording of cyber insurance policies to exclude losses arising from: “state backed cyber-attacks that (a) significantly impair the ability of a state to function or (b) that significantly impair the security capabilities of a state.” The concern raised is that … [Read more...] about Cyber Insurance and the Attribution Conundrum
The secret is out: Why Open Security is key to preventing cyber threats
For decades, the cybersecurity industry has been shrouded in secrecy. This is partly because of the misunderstanding that cybersecurity often relies on obscurity as its primary form of defense. As the thinking goes, if adversaries don’t know about or understand the security controls that security vendors have in place, it will be easier to defend against cyberattacks.While the … [Read more...] about The secret is out: Why Open Security is key to preventing cyber threats
How the Infrastructure Investment and Jobs Act Delivers on Cyber Resiliency
Attacks and intrusions on our nation’s vital infrastructure — our electrical grid, water systems, ports and oil supply — are on the rise. For example, as reported by the Pew Charitable Trust in March 2021, hackers changed the chemical mixture of the water supply in Oldsmar, Fla., increasing by 100 times the level of sodium hydroxide (lye) in the water supply. In June 2021, … [Read more...] about How the Infrastructure Investment and Jobs Act Delivers on Cyber Resiliency
Global Snack Manufacturer Becomes Cyber Resilient While Cutting Production Costs
Companies aren’t doing business the way they used to, and the shift to hybrid work has forced many to become increasingly security resilient or cease operations. The global food market is no exception. One of our valued customers, Leng-d’Or, was faced with a challenge during the pandemic that could have interrupted its production line, but by some quick thinking, skilled … [Read more...] about Global Snack Manufacturer Becomes Cyber Resilient While Cutting Production Costs
Cyber Security WEBINAR — How to Ace Your InfoSec Board Deck
Communication is a vital skill for any leader at an organization, regardless of seniority. For security leaders, this goes double. Communicating clearly works on multiple levels. On the one hand, security leaders and CISOs must be able to communicate strategies clearly – instructions, incident response plans, and security policies. On the other, they must be able to communicate … [Read more...] about Cyber Security WEBINAR — How to Ace Your InfoSec Board Deck
Cyber Actors Bypassing Two-Factor Authentication Implementations
On March 15, 2022, a government flash bulletin was published describing how state-sponsored cyber actors were able to use the PrintNightmare vulnerability (CVE-2021-34527) in addition to bypassing Duo 2FA to compromise an unpatched Windows machine and gain administrative privileges. This scenario did not leverage or reveal a vulnerability in Duo software or infrastructure, but … [Read more...] about Cyber Actors Bypassing Two-Factor Authentication Implementations
How Identity Protection Can Accelerate Cyber Insurance Initiatives
The growth in frequency and severity of cyberattacks has caused organizations to rethink their security strategies. Major recent security threats, such as high-profile ransomware attacks and the Log4Shell vulnerabilities disclosed in 2021, have led to a greater focus on identity protection as adversaries rely on valid credentials to move laterally across target networks. Cyber … [Read more...] about How Identity Protection Can Accelerate Cyber Insurance Initiatives
Cyber Asset Attack Surface Management with Cisco Secure Cloud Insights: Beyond CSPM
In today’s digital-first world having enterprise grade information, services, and workloads in the cloud is becoming increasingly important for success. Nonetheless the lack of asset visibility that haunted private networks has not disappeared in the cloud era; it has been transferred, or some may say even aggravated. In its Hype Cycle for Security Operations, Gartner has … [Read more...] about Cyber Asset Attack Surface Management with Cisco Secure Cloud Insights: Beyond CSPM
A Free Solution to Protect Your Business from 6 Biggest Cyber Threats in 2022
For the last few years, the cybersecurity threat landscape has gotten progressively more complex and dangerous. The online world is now rife with data thieves, extortionists, and even state actors looking to exploit vulnerabilities in businesses' digital defenses. And unfortunately — the bad guys have the upper hand at the moment. Part of the reason for that is the fallout … [Read more...] about A Free Solution to Protect Your Business from 6 Biggest Cyber Threats in 2022