With corporate America beginning to ask employees to come back to their offices in the fall, cybersecurity teams have the huge task of ensuring that the work environment is safe. This is particularly true of IoT devices, as many have been left unprotected for months.
This edition of the ISMG Security Report features an analysis of ongoing investigations into the use of NSO Group's Pegasus spyware to spy on dissidents, journalists, political rivals, business leaders and even heads of state - and discussion of whether the commercial spyware business model should be banned.
In the world of operational technology (OT), one small change or networking issue can have a significant effect on production, automation systems and even safety. Staying on top of what’s happening in the control network is mission critical – but one can’t monitor and manage what you can’t see.
Following revelations that commercial spyware vendor NSO Group was able to exploit the latest model of the Apple iPhone to install surveillance software, experts describe how Apple could be doing more to lock down its iOS mobile operating system as well as curtail attacks by making them much costlier to run.
Nozomi Networks Vantage™ leverages the power and simplicity of software as a service
(SaaS) to deliver unmatched security and visibility across your OT, IoT, and IT networks.
Vantage accelerates digital transformation for the largest and most complex
Vantage delivers the immediate awareness...
Holistic visibility across OT and IoT is a must for accelerated digital transformation especially for healthcare technology companies. This case study discusses how a healthcare technology company gained visibility across it globally distributed
manufacturing processes and tackled its challenges.
Read this case...
Transportation and logistics organizations are rapidly evolving to improve their service levels and
efficiency. At the same time, safety has never been more important, as risks from cyber threats
increase. The World Economic Forum cited cyberattacks on critical infrastructure, including
transportation, as the...
To improve cyber resilience, many utilities are evaluating
options for augmenting the cybersecurity of their OT and
IoT networks. One fundamental security best practice is
having real-time visibility into cybersecurity attacks, risks
This paper illustrates how a network visibility...
A leak of 50,000 telephone numbers and email addresses led to the "Pegasus Project," a global media consortium's research effort that discovered how Pegasus spyware developed by NSO Group is being used in the wild.
The COVID-19 pandemic has accelerated digital transformation in the manufacturing sector. Innovation and automation are key to unlocking growth potential, but the new technologies driving digitization also increase exposure to cyber threats that can disrupt operations.
Fortunately, advanced solutions that provide...
Cybercrime has continued to rise sharply, perhaps fueled by its potential for profit, while on the other hand, workforces are overwhelmed and vulnerable. Ransomware attacks, for example, are estimated to have grown 116% between January and May of this year and ransomware payments are increasing.
To help defenders...
Amazon's Alexa virtual assistant device and applications are unlawfully recording and storing highly sensitive and private conversations, including discussions of patient information, that were not meant to be recorded, four healthcare workers allege in a lawsuit seeking class action status.
In the latest weekly update, a panel of Information Security Media Group editors discusses key topics, including cybersecurity trends for the second half of the year, IoT device security and the planned security features for Windows 11.