Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Industrial control systems security with Elastic Security and Zeek

Industrial control systems (ICS) have historically been isolated and less interconnected. Isolation was one of the things that kept these systems more secure behind air gaps, at the cost of lost coordination and collaboration. This is rapidly changing with the rise of Industry 4.0 with increased interconnectivity and integration of smart technologies like Industrial IoT (IIoT) and cloud computing in modern industrial processes.

Patch now! The Mirai IoT botnet is exploiting TP-Link routers

Businesses should patch their TP-Link routers as soon as possible, after the revelation that a legendary IoT botnet is targeting them for recruitment. The notorious Mirai botnet, which hijacks control of vulnerable IoT devices, is now exploiting TP-Link Archer AX21 routers to launch distributed denial-of-service (DDoS) attacks.

Berlin Q&A with Porsche Motorspot Head of IT Tag Heuer Porsche Formula E Team

Decision making during an E-Prix is influenced by the ability to analyze data efficiently at speed. Did you know the TAG Heuer Porsche Formula E Team use multiple channels on a private network to make crucial real-time judgement calls? Watch Friedemann Kurz, Head of IT at Porsche Motorsport, to find out more.

The Tag Heuer Porsche Formula E Team uses a private network at an E-Prix. Here's why:

When it comes to IT architecture, the set-up is the same for the TAG Heuer Porsche Formula E Team, making it easier to identify bottlenecks or malware threats. Thomas Eue, Lead IT Product Manager at Porsche Motorsport, explains why the Team doesn’t connect to public networks at race weekends.

Future of Data Privacy Examining the Impact of GDPR and CPRA on Business Practices

Welcome to our exciting and informative discussion on the future of data privacy and the impact of the General Data Protection Regulation (GDPR) and California Privacy Rights Act (CPRA) on business practices! In this webinar, we cover a range of fascinating topics including an overview of GDPR and CPRA regulations, key differences and similarities between the two, and strategies for ensuring compliance.

A Guide to Standard SBOM Formats

The software bill of materials (SBOM) has become an increasingly important tool for providing much-needed clarity about the components that make up software — both for application security purposes and governmental compliance. Unlike manual spreadsheets, SBOMs standardize everything into a particular format to minimize inconsistencies. There are three primary SBOM formats currently available, which allow companies to easily generate, share, and consume SBOM data.

Demystifying Security Validation Technologies: What You Need to Know About Automated Pen Testing

You can’t predict the future, but you can prepare for it. When it comes to IT (and OT), security validation is the closest to predicting the future as you can get. This is the second post in our series “Demystifying Security Validation Technologies: What You Need to Know,” in which we break down a number of security validation methods available today, provide the strengths and weaknesses of each, and explain how each functions in different IT environments.

Innovation in Cybersecurity: Building a Secure Digital World

Our mission is to build a secure digital world - but when we think about the future, we realize it can't happen without intelligence. Today, cyber threats haven't been tamed, and to get to a point that they are, involves a collective effort globally to solve for them. How? By thinking differently. Join us in building a future in which neutralizing cyber threats is the norm as our security solutions protect us.