Zephyrnet Logo

Tag: network segmentation

Critical Infrastructure Security: Observations From the Front Lines

COMMENTARYRecent headlines around Volt Typhoon, a state-sponsored Chinese threat actor targeting US critical infrastructure, have caused alarm over attacker dwell time and put critical infrastructure security in...

Top News

Russian APT Releases More Deadly Variant of AcidRain Wiper Malware

Researchers have uncovered a more dangerous and prolific version of the wiper malware used by Russian military intelligence to disrupt satellite broadband service in...

Chinese APT ‘Earth Krahang’ Compromises 48 Gov’t Orgs on 5 Continents

A previously unidentified Chinese espionage group has managed to breach at least 70 organizations across 23 countries, including 48 in the government space, despite...

Election cybersecurity: Protecting the ballot box and building trust in election integrity

Critical Infrastructure What cyberthreats could wreak havoc on elections this year and how...

NSA’s Zero-Trust Guidelines Focus on Segmentation

The US National Security Agency (NSA) delivered its guidelines for zero-trust network security this week, offering a more concrete roadmap towards zero-trust adoption. It's...

Introducing Rapid Verification of Zone-to-Zone Segmentation with Network Perception

In today's fast-paced digital world, network security is more important than ever. With cyber threats constantly evolving and becoming more sophisticated, it is crucial...

Designing for Security for Fully Autonomous Vehicles – Semiwiki

With the advent of IoT devices, vehicles have become increasingly interconnected, offering enhanced automation, connectivity, electrification, and shared mobility. However, this progress also brings...

How Raspberry Robin Exploits 1-Day Bugs to Infiltrate Windows Networks

Title: Raspberry Robin: Exploiting 1-Day Bugs to Infiltrate Windows Networks Introduction: In the world of cybersecurity, hackers are constantly finding new ways to exploit vulnerabilities in...

The 7 deadly cloud security sins and how SMBs can do things better

Business Security By eliminating these mistakes and blind spots, your organization can take...

Inside the Mind of a Cyber Attacker! – Supply Chain Game Changer™

In the perpetual game of cat and mouse between cyber attackers and defenders, the battleground is vast and dynamic. Understanding the Tactics, Techniques, and...

How Zero Trust Addresses the Unique Security Risks of IoT Devices

The increasing number of Internet of Things (IoT) devices makes everyday life easier and more convenient. However, they can also pose many security risks....

Data Management Trends in 2024 – DATAVERSITY

The trends in Data Management for 2024 can be expected to range from the impact of the EU’s Digital Services Act (DSA) package to new variations...

Latest Intelligence

spot_img
spot_img