sponsored content news
Implementing effective OT security posture
New guide details key components of operational technology (OT) cybersecurity program.
New research identifies poor IAM policies as the greatest cloud vulnerability
Palo Alto Networks threat intelligence unit finds identity and access management policy flaws remain a principal cause of cloud security vulnerabilities.
Combatting emerging-malware aimed at industrial control systems
New report offers insights on CHERNOVITE and the PIPEDREAM malware that threatens industrial control systems.
Achieving web application security
By adopting modern application security tools, organizations can reevaluate teams, structures and processes to address current development needs better — and evolving missions.
Strengthening industrial cybersecurity
Dragos’ analysis and recommendations to combat global threat activity targeting industrial environments.
New security threats target industrial control and OT environments
A new Dragos report highlights recent threats targeting industrial control systems and operational technology environments and identifies strategies to address them.
How to improve threat detection in ICS environments
A new report evaluates an end-to-end cyberattack on industrial control systems and offers solutions for threat detection capabilities.
Overcoming key business and operational challenges with XDR
A new report shares how AI-driven extended detection and response (XDR) platforms help leaders overcome key challenges stemming from the cybersecurity skills shortage.
Cyber measures gain momentum at federal agencies
The White House cybersecurity order proved “game-changing" in fostering leadership support for cybersecurity, zero-trust policies and security-at-the-edge efforts, a new survey finds.
Trends that shaped ransomware – and why it’s not slowing down
A new report analyzes the ransomware epidemic and how it will shape the threat landscape in 2022 and beyond.