In this webinar, we’ll discuss how compliance and standardization can amplify the spread of malware and increase the damage rendered by security vulnerabilities
This book may be for Dummies, but any security professional in the utility sector will likely already have a deeper knowledge of ICS than this book offers.
Given that our cars are going to communicate even more in the future, it’s imperative we get this right now to stop the hacker getting into the driving seat.
From the hacking of cars and planes, to the security of Wi-Fi enabled kettles, the Internet of Things has the potential to cause a myriad of cybersecurity risks. But what is the real level of risk to enterprises?
Billed as a bigger security vulnerability than even Heartbleed, Shellshock poses a potential risk to hundreds of thousands of UNIX and Linux computers.
Patch management continues to pose a huge challenge for information security practitioners as they grapple with the challenges of prioritising which vulnerability to patch first.