Research From Claroty’s Team82 Highlights Remote Access Risks Facing Mission-Critical OT Assets

May 24, 2024 at 02:16PM Claroty, a cyber-physical systems (CPS) protection company, has released proprietary data revealing security risks in mission-critical operational technology (OT) assets due to insecure internet connections and known vulnerabilities. To address this, they launched the Claroty xDome Secure Access, which balances secure control and frictionless access for enhanced productivity and reduced … Read more

Norway recommends replacing SSL VPN to prevent breaches

May 16, 2024 at 03:08PM The Norwegian NCSC advises replacing SSLVPN/WebVPN with more secure options due to repeated vulnerabilities exploitation in network devices. The transition deadline is 2025, with critical infrastructure entities expected to switch by the end of 2024. The recommended alternative is IPsec with IKEv2, aiming to decrease the attack surface for secure … Read more

Zscaler to Acquire Network Segmentation Tech Startup Airgap Networks

April 11, 2024 at 12:42PM Zscaler announced the planned acquisition of Airgap Networks, a startup focusing on network segmentation and secure access technologies. Financial details were not disclosed. Zscaler intends to combine Airgap’s technology with its Zero Trust SD-WAN suite to protect east-west traffic in various environments without the need for additional hardware or disruption. … Read more

3 Strategies to Future-Proof Data Privacy

March 28, 2024 at 10:04AM To comply with evolving privacy regulations, regularly assess data storage strategies, secure external network access, and implement data plane security measures. Based on the meeting notes, the key takeaways are: 1. Regularly review data storage strategies to meet changing privacy regulations. 2. Ensure secure access to external networks to comply … Read more

Identity Alone Won’t Save Us: The TSA Paradigm and MGM’s Hack

November 7, 2023 at 10:04AM The recent cyberattack on MGM Resorts resulted in widespread outages and the compromise of various systems, such as slot machines and payment systems. The attack highlighted the importance of properly managing access and authentication controls. Simply adding more identity products is not the solution. Instead, organizations should focus on authentication, … Read more