End the air gapping myth in critical infrastructure security

In an environment where we’re seeing increasing demand for connectivity between operational technology (OT) and IT, security teams have to dispel the air gapping myth to acknowledge that IT influences can exploit OT connections. The air gapping approach was used for a long time to prevent any impact on ICS systems. But it’s wishful thinking…

IDG Contributor Network: Putting the privacy into cybersecurity at DHS

Security and privacy have an awful lot in common; both disciplines care deeply about the confidentiality of personally identifiable information. Attend a cyber-security conference or a privacy conference, you are likely to hear the same catch phrases “[Security/privacy] is best addressed at the earliest stages of system development, not at the end when retrofitting requirements…

93% of SOC managers unable to triage all potential threats

In mid-2016, Intel Security commissioned a primary research study to gain a deeper understanding of the ways in which enterprises use SOCs, how they have changed over time, and what they will look like in the future. Interviews with nearly 400 security practitioners across several countries, industries and company sizes yielded valuable information on the…

Zcash mining software covertly installed on victims’ machines

Software “mining” the recently established Zcash (ZEC) cryptocurrency is being foisted upon unsuspecting users, Kaspersky Lab warns. The actual software is not illegal, and not technically malware – it is meant to be used by individuals who are willing to dedicate their machine(s) and pay for the increased electricity usage that accompanies cryptocurrency mining.

Is Bluetooth Security Good Enough for Your Most Sensitive Corporate Communications?

Most users take Bluetooth security for granted. When you’re enjoying the convenience of hands-free phone conversations, streaming podcasts in your car or jogging with your awesome new wireless headphones, do you need to worry about whether the communication channel is secure or not? What’s acceptable for consumers may not meet corporate standards. With a new…

IDG Contributor Network: Grid security insights for 2017: Pressure mounts to prevent physical attacks

As we close out 2016 and look forward to 2017, it seems appropriate to pause a moment and provide some grid security predictions for the new year. Predictions based on trends, insight, and understanding can arm security programs with the knowledge needed to test policies, exercise physical protection systems, and allocate corporate funds for resources….

12 tips for implementing secure business practices

Optiv Security shared a list of a dozen tips for implementing secure business practices during the 2016 holiday season. Security experts developed these recommendations to help security and IT teams better prepare their companies and employees to address the increase in cyber threats that occur during this time of year.

Avoiding Threat Management Rookie Mistakes

What do a Finnish HVAC company and an American car dealership have in common? Both have been doing a poor job running their computer systems and, as a result, both experienced embarrassing threat management blunders. Valtia is the property manager of two apartment buildings in the city of Lappeenranta in eastern Finland. Meanwhile, the car…