SecurityWeek Briefing

Cyber Warfare rife in Ukraine, but impact stays in the shadows.

Views expressed in this cyber warfare, cybercrime, and cybersecurity update are those of the reporters and correspondents.  Accessed on 29 September 2022, 0226 UTC.  Content supplied by email subscription to "SecurityWeek Briefing."


Please click link or scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (machine learning, artificial intelligence, IoT, information security)

SecurityWeek Briefing | Wednesday, September 28, 2022 [Beta]

See Netography Fusion® in Action

Scalable, Continuous Network Security and Visibility

New Netography Fusion® Platform Gives Security and Cloud Operations Teams Visibility and Control of Network Traffic and Context Across Users, Applications, Data, and Devices

Download Now
Torsten George

"Left and Right of Boom" - Having a Winning Strategy

Unfortunately, there is no such thing as 100 percent protection. Therefore, we cannot solely focus on “Left of Boom” processes, but also have to talk about the “Right of Boom”. - Read the Column by Torsten George

Marc Solomon

How Organizational Structure, Personalities and Politics Can Get in the Way of Security Overlook Your Linux Systems

Cyberattacks and data breaches continue to rise year-over-year and another so-called silver bullet technology isn’t going to stop that trend. - Read the Column by Marc Solomon

picture-104 image

How "Long-Sightedness" Can Improve Security and Fraud Programs

Looking long is an important skill for security and fraud teams to develop. Strong leadership, a focus on achieving impactful long-term goals, and the discipline to achieve those goals are all important parts of the game. - Read the Column by Joshua Goldfarb

ICS/OT Security Conference

Attacking ICS With Python

2022 ICS Cybersecurity Conference - October 24th - Atlanta

This 8-hour workshop will be a crash course in ICS vulnerabilities and exploitation, providing hands-on, practical training in the carrying out of attacks against various common types of ICS equipment found in the field, including an HMI, PLC and automated circuit breaker.

Learn More
Hacktivist Attacks Show Ease of Hacking Industrial Control Systems

Hacktivist Attacks Show Ease of Hacking Industrial Control Systems

Hacktivists might not know a lot about industrial control systems (ICS), but they’re well aware of the potential implications of these devices getting compromised. That is why some groups have been targeting these systems — which are often unprotected and easy to hack — to draw attention to their cause.

Read More

If you missed it...

RSS Feed | Webcasts | Virtual Events

© 2022 Wired Business Media


Popular posts from this blog

SecurityWeek Briefing.

Cyber War Newswire

SecurityWeek Briefing.