Security Lessons Companies Can Learn From the U.S. Elections
The election race for the governorship of the state of Georgia promises to be tight, with current estimates showing that Democrat Stacey Abrams and Republican Brian Kemp are in a statistical dead heat. Unfortunately, Georgia is also one of five states that continue to use fully electronic voting with no verified paper ballot trails, raising the specter that, if...
Five Trends in Attacks on Industrial Control Systems
In May, a new modular malware system—dubbed VPNFilter—began running rampant among small and home office-based routers as well as network-attached storage. More than 500,000 devices in 54 countries were infected by the software, according to networking giant Cisco, and what's more—the malware scanned for traffic used in many industrial control systems, known as Modbus.The attack appears to be just...
Five Ways Government Can Help Businesses Fight Nation-State Attacks
Over the past six months, a relatively unsophisticated group of attackers used a variety of remote access Trojans to attempt to grab banking details from companies—a scheme reminiscent of tactics used by cyber-criminals. Yet, these attacks also targeted a number of Russian, Spanish and U.S. government agencies and were more likely the work of nation-state operators, according to an analysis...
Five Basic Controls Companies Can Implement to Improve Data Hygiene
Many companies are failing to implement the most basic security controls to lock down their networks and data, an oversight that leaves them less able to respond to attacks and security incidents.While security hardening guides that prioritize the most basic steps are freely available from the National Institute of Standards and Technology (NIST), the Center for Internet Security (CIS),...
Five Security Defenses Every Containerized Application Needs
With the increase in popularity of agile development and DevOps methodologies, containers have taken off as a way to create easily managed and reproducible software components. Attackers have taken notice, however, and attempts to compromise containers are on the rise. When container management firm Sysdig put a cluster of containers online and exposed the application programming interface (API), for example,...
How Blockchain Can Secure Supply Chains, IoT Devices, and More
On July 9, crypto-currency exchange Bancor announced that hackers had compromised one of the company's digital wallets, using the keys to steal about $23.5 million in Ethereum and other digital currencies. The compromise is the latest digital theft of crypto-currencies based on digital tamperproof ledgers, known as blockchains. In Bancor's case, however, the company had a built-in failsafe to claw...