حافظ على تدفق المياه لوزارة الدفاع: تأمين التكنولوجيا التشغيلية من الهجمات الإلكترونية
Malicious actors are ramping up attacks against water and wastewater systems (WWS), which are not only attractive targets but also complex to protect. اعتمدت Department of Defense (DoD) in particular operates a large number of WWS facilities. Read on to learn how a strong cybersecurity program…
Cybersecurity Snapshot: Attackers Hack Routers To Hit Critical Infrastructure, as CISA Calls for More Secure Router Design
CISA is calling on router makers to improve security, because attackers like Volt Typhoon compromise routers to breach critical infrastructure systems. Meanwhile, data breaches hit an all-time high in the U.S. Plus, Italy says ChatGPT violates EU privacy laws. And a cyber expert calls on…
ضعف أمان الهوية هو السبب الجذري للهجمات الدولية القومية ضد مايكروسوفت
ويُظهر الانتهاك الأخير الذي تعرضت له شركة مايكروسوفت مرة أخرى أن الاكتشاف والاستجابة ليسا كافيين. ونظرًا لأن مصدر الهجوم يتلخص دائمًا في مستخدم واحد وإذن واحد يتم التغاضي عنه، فمن المهم أن تتمتع المؤسسات بأمان وقائي قوي.
الشركات الرائدة في مجال السحابة يتحدثون عن التحديات الرئيسية
يمثل وجود عدد هائل من الهويات والأنظمة والطهاة في مطبخ السحابة تكليفًا معقدًا بالفعل.
Cybersecurity Snapshot: New Guide Details How To Use AI Securely, as CERT Honcho Tells CISOs To Sharpen AI Security Skills Pronto
Cyber agencies from multiple countries published a joint guide on using artificial intelligence safely. Meanwhile, CERT’s director says AI is the top skill for CISOs to have in 2024. Plus, the UK’s NCSC forecasts how AI will supercharge cyberattacks. And a global survey shows cyber pros weighing…
Cybersecurity Snapshot: Critical Infrastructure Orgs Cautioned About Chinese Drones, While Water Plants Advised To Boost Incident Response
Find out why Uncle Sam is warning critical infrastructure facilities about drones made in China, while urging water treatment plants to beef up incident response plans. Plus, the challenges stressing out CISOs are also opening new doors for them. In addition, the latest on the Androxgh0st malware…
Cybersecurity Snapshot: How To Boost the Cybersecurity of AI Systems While Minimizing Risks
Check out expert recommendations for deploying AI tools securely. Plus, the World Economic Forum ranks cyberattacks and AI misinformation among today’s top global risks. In addition, cyber insurance demand is forecast to grow robustly. And a warning about adversary-in-the-middle (AiTM) attacks and…
Cybersecurity Snapshot: NIST Unpacks Cyberattacks Against AI Systems, as FBI Strikes ALPHV/Blackcat Ransomware Gang
Want to learn more about protecting AI systems from malicious actors? A new NIST guide aims to help you identify and mitigate attacks targeting AI tools. Plus, new granular configuration recommendations for securing Microsoft 365 are out. In addition, the cost of cyber incidents is rising. And…
$18.2 Million Funding Available for Tribal Government Cybersecurity
The Tribal Cybersecurity Grant Program (TCGP) is accepting applications through January 10, making $18.2 million in federal grant funding available to eligible tribes to reduce cyber risk.
Tenable OT Security: مراجعة لعام ٢٠٢٣
As we reflect on the many accomplishments Tenable OT Security achieved in 2023, one thing is clear: we couldn’t have done it without the support and collaboration of our customers and partners.
Cybersecurity Snapshot: What’s in Store for 2024 in Cyberland? Check Out Tenable Experts’ Predictions for OT Security, AI, Cloud Security, IAM and more
The new year is upon us, and so we ponder the question: What cybersecurity trends will shape 2024? To find out, we asked Tenable experts to read the tea leaves. Their 2024 forecasts include: A bigger security role for cloud architects; a focus by ransomware gangs on OT systems in critical…
مشاهدة Tenable Cyber: تعرف على ما يتوقعه خبراء Tenable فيما يتعلق بالأمن الإلكتروني في عام 2024
This week's edition of Tenable Cyber Watch unpacks 2024 predictions for cloud security and operational technology. Also covered: the Tenable's Research team's cybersecurity predictions for 2024. Will cloud architects be more responsible for the security of their apps in 2024? Will…