DHS, FBI Warn of Ongoing APT Attack Against Critical Infrastructure

The Department of Homeland Security and Federal Bureau of Investigation have issued a joint technical alert warning that government entities and organizations in the energy, nuclear, water, aviation, and critical manufacturing sectors are subject to an ongoing attack campaign from an advanced actor, most probably Dragonfly (aka Crouching Yeti and Energetic Bear). The alert was…

Security Pros Admit Snooping on Corporate Network: Survey

IT security professionals, particularly executives, often access information that is not relevant to their day-to-day work, according to a new One Identity study focusing on “snooping” on the corporate network. Dimensional Research polled more than 900 IT security professionals on behalf of One Identity. The respondents were from various types of companies in the United…

Keep Intruders Out of Your Network With Proactive Threat Hunting

A threat hunting program can provide an accurate picture of where your organization is exposed to threats and help security professionals strengthen those weaknesses. If you know how an adversary is breaking into your environment, you can improve your defenses and stop attacks from happening again in the future. This echoes the importance of having…

Companies face legion of security operations challenges

After a week away from all things cybersecurity, I’m back at work and focusing on security analytics and operations again. Alarmingly, most organizations readily admit to problems in this area. For example, a recent ESG research survey of 412 cybersecurity and IT professionals identified some of the biggest security analytics and operations challenges. Some of…

Antivirus: From Stand-Alone Product to Endpoint Feature

Endpoint experts discuss the evolution of AV and its shift from stand-alone product to a feature in broader security tools. The endpoint security evolution is underway. Antivirus (AV) isn’t dead, but its nature is changing as enterprise threats become faster, more widespread, and more complex. “Antivirus has become, to me, more of a specific feature…

Getting Ahead of SD-WAN Security With the Zero Trust Model

As businesses across the world become more geographically diverse and move toward an increasingly hybrid IT environment, legacy infrastructure is struggling to keep up. With more data flowing over enterprise networks from multiple sources, the demand for software-defined wide area network (SD-WAN) technology is growing exponentially. A report from IDC predicted that this technology will…

Solar Panel Flaws Put Power Grids at Risk: Researcher

A researcher has identified many vulnerabilities in widely used solar power systems and he believes some of these flaws could allow hackers to cause large-scale outages, but the affected vendor says his claims are exaggerated. In a scenario he calls “Horus,” which stems from the name of the ancient Egyptian god, researcher Willem Westerhof describes…