The usage and connectivity of operational technology (OT) is rapidly growing as are the number of cyberattacks on OT environments. These attacks can disrupt operations, causing damage that can reach far beyond revenue and reputation to supply chain, human safety and critical infrastructure. To help companies keep their OT environmentsRead More…

BlackBerry has released its Global Threat Intelligence Report, highlighting the volume and model of threats across a range of organizations and regions, including industry-specific attacks targeting the automotive and manufacturing, healthcare and financial sectors. BlackBerry’s Threat Research and Intelligence team identified that in the 90 days between September 1 andRead More…

Zero trust is top of mind for most organizations as a critical strategy to reduce risk, but few organizations have actually completed zero-trust implementations. Gartner predicts that by 2026, 10% of large enterprises will have a mature and measurable zero-trust program in place, up from less than 1% today. GartnerRead More…

Disruptive attacks on critical infrastructure continued in to the second half of 2022 targeting rail, hospitals, manufacturing and energy The latest OT/IoT security report from Nozomi Networks Labs finds wiper malware, IoT botnet activity, and the Russia/Ukraine war significantly influenced the 2022 threat landscape. Continuing the trend that was observedRead More…

Veeam Software has released findings of the company’s fourth annual Data Protection Trends Report to better understand how data protection is evolving in a digital world. The survey found that companies are challenged with more complex hybrid IT environments and are raising budgets to fend off cyberattacks as well asRead More…

Check Point Software Technologies has announced an extended collaboration with Intel Corporation to offer enhanced anti-ransomware capabilities for Check Point Harmony’s customers. As ransomware attacks increase in scale and sophistication, integrating the Intel vPro(R) platform’s Threat Detection Technology (TDT) within Check Point Harmony Endpoint helps provide enterprises with processor levelRead More…

Phil Muncaster, guest writer at ESET explains that the year has seen no shortage of disruptive cyberattacks – here’s a round-up of some of the worst hacks and breaches that have impacted a variety of targets around the world in 2022Read More…

According to Kaspersky research, employees in the UAE trust robots in performing ordinary tasks in logistics, transportation, and cleaning. But they were less willing to trust robots with life critical functions, such as performing surgeries, flying airplanes without pilots, managing dangerous manufacturing or pharmaceutical production. One of the reasons forRead More…