Remove 2022 Remove Malware Remove Network Remove Security
article thumbnail

More connected, less secure: Addressing IoT and OT threats to the enterprise

CIO Business Intelligence

It also introduces new security challenges that demand our attention, especially as IoT is integrated into operational technology (OT) environments. In this article, we’ll explore the risks associated with IoT and OT connectivity and the measures that organizations need to take to safeguard enterprise networks.

article thumbnail

Top 10 Malware Strains of 2021

SecureWorld News

Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) released a joint Cybersecurity Advisory (CSA) providing details on the top malware strains of 2021. The top malware strains in 2021 included remote access Trojans (RATs), banking Trojans, information stealers, and ransomware.

Malware 80
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IoT Adoption in Healthcare Brings Security Opportunities

CIO Business Intelligence

By Anand Oswal, Senior Vice President and GM at cyber security leader Palo Alto Networks Connected medical devices, also known as the Internet of Medical Things or IoMT, are revolutionizing healthcare, not only from an operational standpoint but related to patient care. But ransomware isn’t the only risk.

article thumbnail

Information Stealing Malware on the Rise, Uptycs Study Shows

SecureWorld News

A new study from Uptycs has uncovered an increase in the distribution of information stealing malware. Newly discovered stealer families include modules that specifically steal logs from MFA applications, like the Rhadamanthys malware. Examining the dark web reveals that infostealer malware has become increasingly widespread.

Malware 63
article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO Business Intelligence

With 2022 now in our rearview mirror, we still reflect on a time marked by global upheavals, like the Russia – Ukraine war, to the skyrocketing energy prices and global inflation. While these technologies aren’t complete fixes to the problem, they do offer an extra layer of security to protect our vital infrastructure.

Security 131
article thumbnail

Modernizing Your Security Operations in the Next Phase of Covid

CIO Business Intelligence

Phase two saw more calm to the storm with additional security measures put in place. The third phase is now kicking in as we progress further into 2022, and could showcase the path to far better security as we all learn to co-exist for the long term with the pandemic. PHASE THREE.

article thumbnail

Protecting Your Supply Chain with Data-Aware Security

CIO Business Intelligence

In a previous article , we talked about the need for organizations to secure data wherever it resides. The scope of this problem is serious enough that it has gotten the attention of the US government’s Department of Commerce, which released new guidelines for addressing cybersecurity supply chain risk in May 2022. . The bottom line?

Security 105