Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Zero Trust for State and Local Government

The cybersecurity threat landscape is shifting rapidly. More than 400 ransomware attacks have hit city and county governments in the United States since 2016, crippling vital government services for weeks at a time. Those are only the publicly reported instances – the actual number is likely exponentially higher, and these attacks are growing increasingly sophisticated. Meanwhile, high-profile threats to dams, electrical grids and other facilities, including the Colonial Pipeline attack this year, have shown the vulnerability of America’s critical infrastructure.

OT Vulnerability Management: A Risk-Based Approach

The number of missing security patches in an OT system is typically very large—measured in the thousands, at least. It would be difficult and expensive for an asset owner to evaluate each missing security patch / cyber asset pair. This may be one reason we see a patch everything approach, but this is also difficult and expensive. In fact, assessments show this is rarely done even where required by policy.

Upgrade From Whitelist Profiler to Tripwire State Analyzer

If you’re a Tripwire® Whitelist Profiler customer, then you know that the software does an excellent job of executing its core functionalities. These include comparing the running state of a machine to the approved and expected configurations in your environment to stay in compliance with audit and internal policies. Although Whitelist Profiler is proficient in this regard, that doesn’t mean it can’t be improved in other capacities such as ease of use.

CISA Shields Up: How to prepare for the Russia-Ukraine cybersecurity hazard

CISA issues ‘Shields Up’ alert to warn US companies about potential Russian hacking attempts to disrupt essential services and critical infrastructure as the Russia-Ukraine crisis escalates. Get ahead of the situation with essential information.

Five worthy reads: Wielding privacy-enhancing technologies for secure data sharing

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week let’s zoom in on Privacy Enhancing Technologies (PETs), which deals with the common, yet pressing concern of data privacy and security. Illustrated by Balaji K R

Small Talk: putting data privacy at the forefront with your customers

Conversations about consumer data privacy grow louder each year, with the news headlines to match. Trust in the technology sector is now at an all-time low and customers are increasingly concerned about the privacy of their personal information. It’s become a serious topic that all business owners need to follow, not just security specialists and tech bloggers.

Weekly Cyber Security News 11/02/2022

A selection of this week’s more interesting vulnerability disclosures and cyber security news. For a daily selection see our twitter feed at #ionCube24. I think most of us will remember the big crypto heists, well here is a fascinating article where the criminals thought leaving the proceeds dormant for a few years would eventually lead to no one caring about recovery. Spoiler: They were wrong….

The Ideal Simple and Secure Connection Solution for OT Remote Access

Industrial companies worldwide are adopting capabilities that allow for remote operations. The pandemic has led companies to consider how they can reduce an onsite workforce while continuing with normal operations. Likewise, the worker shortage is leading companies to think in terms of a flexible workforce that may include remote staffing and flexible resourcing.