A global, integrated oil and gas company operating across five continents is using digital
transformation to grow its business, enter new markets and be more competitive. Critical
to this effort is a cloud-based digitalization initiative to enable advanced analytics and
decision-making, fueling greater efficiency,...
Cyber attackers have skills well beyond traditional information technology (IT) intrusions
and data exfiltration techniques—and they have set their sights on operating technology
(OT) environments. They have demonstrated an understanding of industrial control
systems (ICSs) and have an impressive ability to...
Eighty percent of survey respondents say they either are well on the way or getting started toward becoming a "smart manufacturing company." Cloud migration, business resiliency and securing OT environments are among their priorities. Del Rodillas of Palo Alto Networks analyzes the survey results.
While there are many solutions that claim to simplify certificate lifecycle management, not all of
them are built to address the unique complexities of today’s expansive and distributed digital
When evaluating a certificate management solution, it is important to look for
key capabilities that...
Based on real-world experience and research, this whitepaper shares insights into five of the most dangerous and common IaaS configuration mistakes that could expose your public cloud computing environment to a worst-case security scenario. These are:
Early hacked administrative credentials
Attacks through third parties are even more prevalent, which jeopardizes not only the security of sensitive data, but it also provides attack vectors for hackers to take down critical systems via IoT, unauthorized access, etc. Supply chain systems are an integral part of the oil and gas industry’s survival and bad...
Cybersecurity has long been a
challenge across industries. Now that
most organizations are firmly in the age
of digital transformation, protecting
against threats is increasingly complex
but also crucial to shield against
financial and reputational damage.
With hybrid infrastructures accommodating
The convergence of IoT and OT provides a unique opportunity for
a stronger and more resilient infrastructure, whilst
increasing flexibility and responsiveness to new situations.
This needs to be well-managed to ensure the systems are
robust and the risks fully managed, and to maintain an
equivalent level of...
A critical component within millions of consumer and enterprise IoT devices has dangerous software flaws. New research from Forescout Technologies into open-source TCP-IP stacks shows millions of devices from 150 vendors are likely vulnerable.
This report enables a comprehensive, preventative approach to protecting all of the endpoints in your organization, whether office-based or remote. Enabling least privilege and allowing pragmatic application control are often overlooked but are crucial to achieving complete endpoint security.
Download this report...
It's hard to ignore the ubiquity of the internet of things (IoT). Even if you're one of those holdouts that doesn't own consumer IoT devices such as a smart speaker, internet-connected thermostat, or a smart watch, industrial IoT (IIoT) devices - a subset of the IoT landscape - are already playing a part in your daily...
Forescout updated its multifaceted IT/OT visibility and control platform to enhance the product's long-standing reputation for handling network admission controls.
In this review, SANS Analyst Don Murdoch digs into the product's capabilities and explores these key areas:
Device discovery and classification
In this first edition of The Enterprise of Things Security Report, Forescout Research Labs analyzed data from over 8 million devices deployed across the Financial Services, Government, Healthcare, Manufacturing and Retail sectors to assess the current state of enterprise IoT cybersecurity. This information comes from...