Cyber security for digital government leaders

| January 10, 2018

article image
Cyber security is now a significant issue for all government entities. It has broad relevance right across the organization, and can no longer be compartmentalized into niche topics such as national security or technical responses to computer hacking. Important as these issues are, they are just one small part of a much bigger challenge that now pervades the operations of government.

Spotlight

IronNet Cybersecurity

Every day, cyber threats grow more sophisticated, intrusive, disruptive and costly. And as recent headlines have made clear, these attacks are increasingly the work of nation-states and sophisticated criminal gangs. Countless billions of dollars worth of corporate secrets, private customer information and brand reputations have already been lost, or are at risk. And every day, the gap between these rapidly evolving threats and traditional cybersecurity approaches to defend against them grows wider. IronNet Cybersecurity is uniquely positioned to fill this gap. IronNet has assembled a leadership team with unmatched experience with cyber threats, including former heads of and top advisors to the National Security Agency, the National Counterterrorism Center, U.S. Cyber Command, Army Intelligence and more. IronNet offers an integrated, end-to-end approach to cybersecurity that offers breakthrough, patent-pending technology, providing real-time threat assessment and updates, complex beha

OTHER ARTICLES

How the IIoT can subdue cyber security challenges met by software adoption

Article | February 25, 2020

Matt Newton, senior portfolio marketing manager at AVEVA, discusses how IIoT can best cyber security challenges met through software adoption. According to Gartner’s 2019 Industrial IoT Platforms Magic Quadrant report, by 2023 30% of industrial enterprises will have full, on-premises deployments of IIoT platforms. IIoT platforms and software adoption is rapidly increasing – up 15% in 2019 – and this will undoubtedly continue to grow as we progress through the new decade. From enhancing operational performance to improved business processes, adopting new technology and software capabilities is vital for business success in today’s industrial sector. However, when it comes to adopting software and technology, integrating new systems with existing legacy systems in the industry can be a challenge.

Read More

A Closer Look at the Microsoft Exchange Server Cyberattacks

Article | May 13, 2021

We recently posted an article that highlighted the high-profile Microsoft Exchange hack that impacted hundreds of thousands of organizations across the globe. (This article offered some recommendations on how this could have been avoided as well as a special three-month offer to help any company who may have been affected.) Since this cyber attack, even more details are emerging. For example, the White House recently urged victims to quickly patch applications and systems and pushed for them to do it as quickly as possible. One senior administration official emphasized that the window to update these systems could be measured in hours, not even days.

Read More

Security News This Week: A Tiny Piece of Tape Tricked Teslas Into Speeding Up 50 MPH

Article | February 22, 2020

This week was filled with wide-scale calamity. Hundreds of millions of PCs have components whose firmware is vulnerable to hacking which is to say, pretty much all of them. It's a problem that's been known about for years, but doesn't seem to get any better. Likewise, Bluetooth implementation mistakes in seven SoC—system on chips—have exposed at least 480 internet-of-things devices to a range of attacks. IoT manufacturers will often outsource components, so a mistake in one SoC can impact a wide range of connected doodads. The most troubling part, though, is that medical devices like pacemakers and blood glucose monitors are among the affected tech. YouTube Gaming, meanwhile, wants to take Twitch's crown as the king of videogame streaming. But its most-viewed channels are almost all scams and cheats, a moderation challenge that it'll have to take more seriously if it wants the legitimacy it's spending big money to attain. In another corner of Alphabet's world, hundreds of Chrome extensions were caught siphoning data from people who installed them, part of a sprawling adware scheme.

Read More

The British government thinks process sensor cyber issues are real – what about everyone else

Article | February 16, 2020

When Joe refers to analogue devices, he is generally referring to ISA99 / IEC 62443 Level 0 devices, i.e. the sensors and actuators required in any cyber physical system. The vulnerability of these devices is often ignored as the security measures required to protect them are not purely technical but also involve physical and personnel security aspects along with process security (both of the metrology and processing by the device, as well as configuration management and control issues over the lifecycle of analogue devices). The security situation is not helped by the simplistic application of the triad of security goals (confidentiality, integrity and availability) to cyber physical systems.

Read More

Spotlight

IronNet Cybersecurity

Every day, cyber threats grow more sophisticated, intrusive, disruptive and costly. And as recent headlines have made clear, these attacks are increasingly the work of nation-states and sophisticated criminal gangs. Countless billions of dollars worth of corporate secrets, private customer information and brand reputations have already been lost, or are at risk. And every day, the gap between these rapidly evolving threats and traditional cybersecurity approaches to defend against them grows wider. IronNet Cybersecurity is uniquely positioned to fill this gap. IronNet has assembled a leadership team with unmatched experience with cyber threats, including former heads of and top advisors to the National Security Agency, the National Counterterrorism Center, U.S. Cyber Command, Army Intelligence and more. IronNet offers an integrated, end-to-end approach to cybersecurity that offers breakthrough, patent-pending technology, providing real-time threat assessment and updates, complex beha

Events