article thumbnail

Guest Opinion: How Modern Warfare Can Target Vulnerable IIoT Devices

Security Industry Association

In this blog from SIA Cybersecurity Advisory Board member Will Knehr – senior manager of information security and data privacy at i-PRO Americas – learn about how vulnerable industrial Internet of Things (IIoT) devices could become weapons in modern warfare.

article thumbnail

Get Cyber Smart: How to Make Sure Recovery Plans Align with Information Security Needs  

MHA Consulting

Instead, they should be developed in coordination with the cybersecurity department to ensure that recovery measures do not inadvertently create vulnerabilities that can be exploited by hackers. The best way to do this is by making sure business continuity is integrated into a robust information security governance framework.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Get Strong: Unlocking the Power of Vulnerability Management

MHA Consulting

Vulnerability management is the practice of identifying and mitigating the weaknesses in an organization’s people, processes, and technology. I like doing vulnerability assessments. I think vulnerability management is bigger than that. Identifying and mitigating such situations is what vulnerability management is all about.

article thumbnail

Condo Building Vulnerabilities

Disaster Safety

This guide helps drive conversations with maintenance staff and engineers to better inform condo owners how and when to take action, thus giving residents a peace of mind. The post Condo Building Vulnerabilities appeared first on DISASTERSAFETY.ORG. Download Guide.

article thumbnail

Information Assurance: Defined, Explained and Explored

Unitrends

Businesses that store and exchange critical data over information networks need to be mindful of how vulnerable each individual machine can be. The post Information Assurance: Defined, Explained and Explored appeared first on Unitrends.

article thumbnail

Navigating the Security Landscape: A Quick Guide to the Common Vulnerabilities and Exposures Program for Young Professionals

Security Industry Association

One impactful group in this ongoing battle is the Common Vulnerabilities and Exposures Program (CVE). Spearheaded by the MITRE Corporation, CVE is a crucial framework for identifying and managing vulnerabilities across various systems. Risk mitigation: Identifying vulnerabilities is the first step towards mitigating risks.

article thumbnail

What you need to know about the Log4j vulnerability

Acronis

Since being identified on December 9, the Log4j vulnerability has become a major concern for IT professionals who were forced to suddenly shift from their end-of-year wind down to high alert for potential exploits.