What if you could better your competitor’s returns by 372%? Would that make the pain of improving your cybersecurity practices worthwhile? A study by Bitsight and Diligent says that is possible. The study analyzed data from 4,000 companies worldwide and found two interesting statistics. Insurance companies are looking to find actuarial data that helps them […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
At least 68 cyberattacks last year caused physical consequences to operational technology (OT) networks at more than 500 locations worldwide. Damage from these attacks ranged up to $100 millon. OT attacks are attacks on the systems that run businesses like manufacturing, transportation and the cities themselves. If you think about all of the computers that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
If you are a defense contractor – prime, sub or vendor to one of these and you were hoping that CMMC was going to go away, I don’t think that is going to happen – at least not on this president’s watch. Even if the party in power changes in January, I don’t much will […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to Flashpoint, a threat intelligence service, 2023 recorded 6,077 breaches compromising more than 17 billion records. That is a 35 percent increase over 2022. Again, according to Flashpoint, for the first two months of 2024, that number is up 429 percent over the first two months of 2023. The U.S. represented 60 percent of […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
If you are a defense contractor, then over the next few years you will likely have to be compliant and maybe certified for CMMC, either at level one or level two. Level one has about 17 controls and 59 assessment objectives; level two has 110 controls and about 315 assessment objectives. Assessment objectives are the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
If that headline doesn’t keep you up at night, I don’t know what will. The Government Accountability Office (GAO) says they have have found inefficiencies in CISA’s information sharing practices, in particular with critical infrastructure stakeholders. They also say that CISA is understaffed for handling OT incidents. Just to make sure everyone is on the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]