From the Spring 2023 Issue

Best Practices for Critical Infrastructure Security in Transportation

Author(s):

Krishna Chaitanya Tata, Operational Technology Cybersecurity Leader, IBM

Critical Infrastructure Security in Transportation

Introduction Critical Infrastructure (CI) has become the new battlefield in the complex geopolitics of the current times. Operational Technology (OT) is the new ‘crown jewels’ that rival nation states and rogue actors regularly target. The transportation sector is one such CI sector that continues to be a prime target for malicious cyber-attacks. In November 2022 … Read more

From the Spring 2023 Issue

Staying Cybersecure in 2023: Implementing Blockchain Technology

Author(s):

Joe Darrah, Freelance, Journalist

Stay Cybersecure in 2023

Cyberterrorism is a persistent, unrelenting threat to the security of any organization that utilizes the internet or any networked system today. Consider the attack launched on the United States Colonial Pipeline Company in May 2021 and the subsequent decision to pay the offenders $4 million in a ransom blackmail scheme in order to restore the … Read more

From the Spring 2023 Issue

High-Tech Layoffs and the Cybersecurity Risks that Result: The Need for a Holistic Approach

Author(s):

Glenn Axelrod, M.S, CISA, CISM, CRISC, HKA Technology Solutions, L.L.C.

In today’s fast-paced, technology-driven business landscape, high-tech layoffs and cybersecurity risks are two critical challenges that organizations must address. The COVID-19 pandemic has accelerated the shift towards automation and digitalization, leading to widespread job losses in various industries. At the same time, the increase in remote work and online transactions has led to a sharp … Read more

From the Spring 2023 Issue

An Overdue New Approach to a Generations-old Problem

Author(s):

Dan Richings, Senior Vice President, Global Presales and Solutions Engineering, Adaptiva

Endpoint Computing Security

The world is in a constant state of tumultuous change and in many cases uncertainty. This is particularly taxing on people whose job it is to manage the technology we all use to remain productive throughout the chaos. IT departments in enterprise organizations around the world are full of professionals who work much harder than … Read more

From the Spring 2023 Issue

Protecting Assets in the Cloud with Cloud Posture Security Management (CPSM)

Author(s):

Claus Nielsen, Chief Marketing Officer, Holm Security

CPSM

Cloud-based applications and services can quickly optimize operations for businesses across the globe. The downside to this is the unique challenge it brings to cybersecurity. With cloud security breaches becoming increasingly commonplace, any organization looking to secure the critical assets stored with one or more cloud service provider must look to utilize a Cloud Posture … Read more

From the Spring 2023 Issue

Ransomware Prevention by Pen Testing

Author(s):

Paul Kubler, Red Team Lead, CYBRI

Ransomware Prevention by Pen Testing

Ransomware continues to be a major problem for organizations and costs them a significant amount of money and time to remediate. Even if a company has the best external IT security in place, a single email attachment can lead to a breach. More and more organizations are learning from this and testing their environment by … Read more

From the Spring 2023 Issue

Three Ways to Protect Your Business Against Wiper Malware: The Growing Cyber Threat

Author(s):

Ahsan Siddiqui, Director, Product Management, Arcserve

A fast-growing and alarming threat to corporate data is wiper malware. Unlike ransomware, which can encrypt and disable your files until you pay a ransom, wiper malware deletes company data permanently to cause as much destruction as possible. Once it infects your system, it will make your data completely unrecoverable. This type of malware is … Read more

From the Winter 2023 Issue

Shifting from Reactive to Proactive Security is on the Horizon

Author(s):

A.J. Nash, Vice President of Intelligence, ZeroFOX

Reactive to Proactive Security

Security leaders often mention that their primary goal is to get ahead of threats instead of responding after something terrible has been discovered. Yet, despite that consistent target to move from a reactive to a proactive security posture, the majority of cybersecurity budgets and efforts continue to focus in the opposite direction. Let’s dig into … Read more

From the Winter 2023 Issue

Fighting Against Cybercriminals: Using The FBI’s Out-of-the-Box Approach

Author(s):

Anh Tran, Senior Data Scientist, DevoTeam

Fighting Against Cybercriminals

It is no exaggeration that cybercrime, if not addressed effectively, could change the shape of the economy. Its costs are predicted to reach $10.5 trillion USD annually by 2025, up from $3 trillion USD in 2015, according to Cybersecurity Ventures [1]. If it were measured as a country, cybercrime would be the world’s third-largest economy … Read more

From the Winter 2023 Issue

Dynamic Malware Including Trends from 2022

Author(s):

Meghan Jacquot, Security Engineer, Inspectiv

Dynamic Malware

As cybersecurity professionals, defenders and red teamers, we are well aware of the pervasiveness of malware. Malicious software, written in a variety of programming languages and distributed in many ways, continues to be a main lever in cyber-attacks.  Just as we read articles, attend conferences, and continue our learning, so do threat actors. It is … Read more