Network detection and response delivers ground truth in cybersecurity, giving organizations crucial visibility into attacker behavior before, during and after ransomware attacks. Corelight CEO Brian Dye explains how NDR helps security teams verify threats and contain incidents effectively.
The NIS2 Directive focuses on addressing gaps and strengthening the security of network and information systems across the European Union. NIS2 mandates rapid incident reporting and holds senior management accountable for cybersecurity, shifting responsibilities to the board level.
Centralized architecture in the automotive industry streamlines cybersecurity and supply chain operations by reducing hardware components and enabling quicker fixes. But that centralization also poses major cybersecurity challenges, said Thomas Sermpinis, technical director at Auxilium Pentest Labs.
Thijs Alkemade, security researcher at Computest Sector 7, discusses significant vulnerabilities in electric vehicle chargers. His findings highlight how attackers can exploit these flaws to remotely execute code, posing severe risks to EV infrastructure.
Piotr Ciepiela, EMEIA cybersecurity leader at EY, discusses the challenges of securing OT systems and contrasts them with IT SOC environments. He emphasizes the need for specialized tools, dedicated personnel and strong collaboration with engineering teams to manage OT SOC operations.
Hardware security remains a critical concern for IoT and embedded devices. NCC Group's Alex Plaskett, security researcher, and Robert Herrera, senior security consultant, discuss critical vulnerabilities in Sonos devices and best practices for safeguarding hardware and software.
As the chief privacy officer at UChicago Medicine, Karen Habercoss likes to tell her peers, "I know more about security than the average bear." And her knowledge has been put to the test in recent years, with the adjustment to remote work, telehealth and digital transformation.
As concerns grow about China's cyberthreat to U.S. critical infrastructure, Scythe founder and CEO Bryson Bort suggests the actual risk may not be as severe as feared. He explains the factors that might limit China's cyber activities and the real strategic vulnerabilities that could be targeted.
Aftin Ross, deputy director of the Office of Readiness and Response at FDA's Center for Devices and Radiological Health, discusses the latest medical device cybersecurity regulations, industry collaboration and manufacturers' efforts to address vulnerabilities and ensure patient safety.
We’ve talked a lot about the convergence of networking and security over the years. It is a natural evolution to turn to connecting and securing OT environments and cyber-physical systems. Fortinet's John Maddison opens up on the debut of Fortinet's new OT Security Platform.
The recent CrowdStrike outage highlights the need to shift from reactive risk management to proactive measures in cyber-physical security. Claroty CEO Yaniv Vardi emphasizes the importance of compensating controls, network segmentation and secure remote access in preventing similar incidents.
In this special edition of the ISMG Editors' Panel, CyberEd Board member Ian Thornton-Trump joined editors to discuss the fallout from the massive CrowdStrike IT outage, the reaction from the tech industry and how we can learn from the incident and create more resilient operations.
Kenneth Townsend, CISO of Ingredion Inc., shares strategies for managing cybersecurity in the manufacturing sector. He discusses the balance between flexibility and security and the need to understand business operations and leverage managed services for comprehensive protection.
Steve King served in senior leadership roles in technology development and deployment for the past 25 years. He worked as author, serial startup founder, CIO, CTO, CISO, CMO and - most recently - a passionate campaigner for cybersecurity education at ISMG. King died June 27, 2024, after an illness.
David Ortiz, Global CISO of Church & Dwight, stresses the importance of comprehensive preparedness, including cybersecurity, disaster recovery, business continuity and crisis management, to build resiliency in OT manufacturing security practices.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ot.today, you agree to our use of cookies.