Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The No-Cost Way to Level Up Your Cybersecurity Posture

In recent weeks President Biden issued a statement encouraging organizations to level up their cyber defenses in what he called “a critical moment to improve domestic cybersecurity and bolster national resilience.” The following week, the federal budget proposal for FY2023 was released with a nearly $11 billion line item for cybersecurity measures.

Forescout - Security is a Journey Shared

Security teams across the globe face many challenges, not the least of which is trying to deal with an explosion in the number of digital assets while facing a shortage of cybersecurity personnel. You don’t need more security products; you need a force multiplier – a platform that makes your team more effective and able to focus on what matters.

New Supply Chain Vulnerabilities Impact Medical and IoT Devices

Forescout’s Vedere Labs, in partnership with CyberMDX, have discovered a set of seven new vulnerabilities affecting PTC’s Axeda agent, which we are collectively calling Access:7. Three of the vulnerabilities were rated critical by CISA, as they could enable hackers to remotely execute malicious code and take full control of devices, access sensitive data or alter configurations in impacted devices.

Monitoring Cyber Threats Tied to the Russia-Ukraine Conflict

Beyond the disturbing images of the invasion of Ukraine that began February 24 are the invisible cyberattacks that preceded it and continue to be waged on Ukraine by Russian state-sponsored and other threat actors, which also threaten the West. Vedere Labs, Forescout’s threat intelligence and research team, is closely monitoring the evolution of cyber activities connected to the Russian-Ukrainian conflict.

Cybersecurity Asset Management: Know What's on Your Network

Guessing how many marbles are in a jar is either a fun carnival game (pick the average based on the wisdom of the crowd) or a math problem involving orb volume, cylinder volume and the estimated space between marbles. You can also just count the marbles. Unfortunately, when it comes to identifying the number of devices connected to your network, none of these approaches works – although quasi-manual counting remains all too common.

BlackByte Ransomware Breach: Can't Forget Compliance Basics

On Sunday, Feb. 13, the NFL’s San Francisco 49er organization issued a statement confirming they experienced a network security incident. Shortly after the incident, BlackByte ransomware gang listed the 49ers as one of their alleged victims. The 49ers franchise didn’t confirm if ransomware was involved, but it did state that only the corporate IT network was affected. As with all breaches, one commonality eventually appears: vulnerabilities.

How to meet OMB's Zero Trust Strategy goals for IT, IoT and OT Devices

On Jan. 26, the Office of Management and Budget (OMB) published its widely anticipated final version of its zero trust architecture strategy, identifying top cybersecurity priorities for the federal government. This achievement raises the country’s cyber defense strategy to a level commensurate with the “increasingly sophisticated and persistent threat campaigns” it faces.