cybersecurity

MalwareBytesSecurity

The effects of climate change on cybersecurity

Credit to Author: Pieter Arntz| Date: Fri, 13 Mar 2020 18:55:13 +0000

We explore the relationship between climate change and cybersecurity, two of the major issues of our time. Does cybersecurity actually contribute to global warming? Or can climate change illicit an uptick in cybercrime? We take a look.

Categories:

Tags:

(Read more…)

The post The effects of climate change on cybersecurity appeared first on Malwarebytes Labs.

Read More
ScadaICSSchneider

Effective cybersecurity solutions and the Cybersecurity Tech Accord

Credit to Author: Christophe Blassiau| Date: Tue, 25 Feb 2020 09:46:06 +0000

Earlier today, Schneider Electric joined more than a hundred other industry thought leaders and forward thinkers as a signatory to the Cybersecurity Tech Accord. Like us, these companies are committed… Read more »

The post Effective cybersecurity solutions and the Cybersecurity Tech Accord appeared first on Schneider Electric Blog.

Read More
MicrosoftSecurity

Free import of AWS CloudTrail logs through June 2020 and other exciting Azure Sentinel updates

Credit to Author: Todd VanderArk| Date: Thu, 20 Feb 2020 14:00:44 +0000

Learn how Azure Sentinel helps SecOps to improve security across hybrid environments with free import of AWS CloudTrail logs through June 2020 and other product updates.

The post Free import of AWS CloudTrail logs through June 2020 and other exciting Azure Sentinel updates appeared first on Microsoft Security.

Read More
MicrosoftSecurity

Microsoft Threat Protection stops attack sprawl and auto-heals enterprise assets with built-in intelligence and automation

Credit to Author: Todd VanderArk| Date: Thu, 20 Feb 2020 14:00:09 +0000

Threat protection that changes our approach to attacks requires built-in intelligence that can understand how an attack got in, prevent its spread across domains, and automatically heal compromised assets.

The post Microsoft Threat Protection stops attack sprawl and auto-heals enterprise assets with built-in intelligence and automation appeared first on Microsoft Security.

Read More
ScadaICSSchneider

Dispelling the Myths Surrounding Operations Technology (OT) Network Cybersecurity

Credit to Author: Michael Pyle| Date: Thu, 20 Feb 2020 13:00:41 +0000

According to Microsoft, the annual damage caused by cybercrime is expected to reach $6 trillion by 2021, up from $3 trillion in 2015. This number includes significant increases in attacks… Read more »

The post Dispelling the Myths Surrounding Operations Technology (OT) Network Cybersecurity appeared first on Schneider Electric Blog.

Read More
MicrosoftSecurity

Defending the power grid against supply chain attacks—Part 1: The risk defined

Credit to Author: Todd VanderArk| Date: Tue, 18 Feb 2020 17:00:31 +0000

The “Defending the power grid against supply chain attacks” blog series analyzes how supply chain attacks are conducted and the steps utilities, device manufacturers, and software providers can take to better secure critical infrastructure.

The post Defending the power grid against supply chain attacks—Part 1: The risk defined appeared first on Microsoft Security.

Read More