Data Security, Network Threat Detection

OT/IoT Security Report Cyber War Insights, Threats and Trends, Recommendations

August 30, 2022

Nozomi Networks Labs is dedicated to reducing cyber risk for the world’s industrial and critical infrastructure organizations. Through its cybersecurity research and collaboration with industry and institutions, it helps defend the operational systems that support everyday life. The Labs team conducts investigations into industrial device vulnerabilities and, through a responsible disclosure process, contributes to the publication of advisories by recognized authorities.

Spotlight

Xtremeforensics

The roots of XtremeForensics can be traced back to 1994 when the first version of what is now ILooK was being distributed to the intelligence community of MI-5 and MI-6 in the UK. Over the next few years ILooK was only available to a subscribed user base of Law Enforcement, Intelligence Services and the Military. By 2002 ILooK was being used in 67 countries and its development was being funded by various agencies in the US that included the FBI, the US Department of Defence and the Treasury Department. During the 9/11 trials all digital forensic evidence introduced into Federal Court was processed using ILooK. This year also saw the creation of Perlustro to manage a 6-year contract with the US Internal Revenue Service.

OTHER WHITEPAPERS
news image

Cross-Generational Security Of Mobile Telephony

whitePaper | August 4, 2022

Abstract— With the recent roll-outs of 5G networks and the rise of phones supporting the standard, it’s critical to examine the technical underpinnings of 5G system security. The fifth generation of 3GPP (3rd Generation Partnership Project) mobile telephony, the lack of understanding, outright hostility, and general confusion surrounding this roll-out is unmatched in the history of mobility. We aim to alleviate much of the confusion and hostility by providing an overarching description and security document.

Read More
news image

NMS Security Architecture Considerations & Approaches

whitePaper | August 26, 2022

The SolarWinds compromise became public in December 2020 and was a massive wake up to the industry. Likely a state-sponsored attack, it compromised potentially thousands of governments and other high-profile organisations across the globe. Many organisations are currently in damage control following the breach. Many of them are unsure if the perpetrators have entered, spread and are still persistent within their environment - even after they shut down the SolarWinds Platforms.

Read More
news image

Revolutionizing cybersecurity

whitePaper | October 31, 2021

FINX, a platform established since 2018 that is enabled by blockchain technology to create the world’s 1st comprehensive decentralized banking platform. FINX aspires to resolve the problem of high banking costs imposed by conventional banks and serve the unbanked market in Southeast Asia.

Read More
news image

Avoiding the Security Pitfalls of Digital Transformation

whitePaper | April 1, 2020

Avoiding the Security Pitfalls of Digital Transformation is a webinar that will explore how organizations can cut through the noise and make a success of cloud transformation, leveraging the benefits of cloud technologies including efficiency, agility and scalability while avoiding the pitfalls.

Read More
news image

Global Threat Landscape Report A Semiannual Report by FortiGuard Labs

whitePaper | August 16, 2022

Another half-year through unprecedented times has passed. But as unique as these times may feel, we continue to see familiar exploits, names, and attacks taking up space. To help you and your business feel confident in your ability to protect yourself against the threats that continue to come our way, this report looks back on the cyber threat landscape of the first half of 2022 using our global array of sensors monitored by FortiGuard Labs. Here’s what we learned:

Read More
news image

The Ransomware Threat

whitePaper | December 22, 2022

Ransomware continues to be among the most critical risks facing organizations of all sizes. Attackers have perfected techniques and business models that will pose a challenge to even the best prepared organizations. While the encryption of a high volume of computers on a network can potentially be mitigated by adequate backups, ransomware actors have discovered new avenues of extortion, such as threatening to release data stolen prior to encryption. While ransomware attacks are time consuming to perform, ransomware actors have managed to achieve scale through the introduction of “ransomware-as-a-service” operations, renting out their tools and infrastructure to other attackers in exchange for a cut of the profits.

Read More

Spotlight

Xtremeforensics

The roots of XtremeForensics can be traced back to 1994 when the first version of what is now ILooK was being distributed to the intelligence community of MI-5 and MI-6 in the UK. Over the next few years ILooK was only available to a subscribed user base of Law Enforcement, Intelligence Services and the Military. By 2002 ILooK was being used in 67 countries and its development was being funded by various agencies in the US that included the FBI, the US Department of Defence and the Treasury Department. During the 9/11 trials all digital forensic evidence introduced into Federal Court was processed using ILooK. This year also saw the creation of Perlustro to manage a 6-year contract with the US Internal Revenue Service.

Events

Conference

Conference

Conference

Conference

Conference

Conference