Remove Article Remove Energy and Utilities Remove Government Remove How To
article thumbnail

Hidden Biases in Cybersecurity Reviews – And How to Use Them

eSecurity Planet

Technology reviews can be a temptingly easy way to gain insight into the often impenetrable world of enterprise cybersecurity products, but you need to know how to use them. To help, we’ll cover the pros, built-in biases, and suitability of each type of technology review and how to use each review type as a buyer.

article thumbnail

LookingGlass Cyber Solutions: Threat Intelligence Review

eSecurity Planet

The TIP provides security professionals with accelerated analysis of how threats might impact the organization and how to counter those threats. This article provides more in-depth information on the product and its features. For a comparison with other TIP products, see our complete list of top threat intelligence companies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

We each need to consider how these trends may affect our organizations and allocate our budgets and resources accordingly: AI will turbo-charge cybersecurity and cyberthreats: Artificial intelligence (AI) will boost both attackers and defenders while causing governance issues and learning pains.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

For example, in 2009, the Obama administration provided financial incentives to utilities in the United States. And again, smart meters were positioned squarely as making the environment more friendly by knowing how and when energy is being used by individual customers. Environmental effects caused by pollution.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

You're really looking at a government agency from some some country who's politically motivated and who can afford to put the money and the time into building a threat like this and who has the insider information from a uranium enrichment facility that would facilitate building a threat? But also war over the internet. So it shouldn't be.

article thumbnail

The CyberWire Daily Podcast EP. 389 With Guest Speaker David Brumley

ForAllSecure

This effectively limits its market to government customers, and these, indeed, seem to have been NSO Group's principal buyers. Its apparent goal is espionage directed against the financial and energy sectors. Government agencies are also targeted. Dave Bittner: [00:07:05] And so how is that going? Pegasus is pricey.

Cloud 52
article thumbnail

Game Theory: Why System Security Is Like Poker, Not Chess

ForAllSecure

When you capture someone else’s exploit and use it (or patch it), you’ve used their energy against them. If you can better use an adversary’s energy and time for your own benefit, you have a higher chance of succeeding. There is value in offense and you get some utility such as access, intelligence, or control.