Showing results for:

Search Results for: ransomware – Page 2

A Cyber Wakeup Call for Operational Technology

The cyber threat is everywhere. Criminal enterprises and foreign state actors aren’t just attacking IT systems to steal data or make ransomware demands. They’re...

5 Lessons From a Devastating Series of Cyberattacks

Hackers earlier this year launched aggressive, coordinated cyberattacks on three large British retailing chains: Harrods, Marks & Spencer, and Co-op. To defend itself, Marks...

Cybersecurity

Guarding the Tech That Drives Manufacturing U.S. industry’s increasing reliance on data and connectivity raises the danger of online attacks by malicious forces. That’s...

MxD with Boeing: News You Can Use — Wipeout: The Rise of Data Destruction Malware

Imagine that you’ve been hit by a cyber attack. You’re scrambling to respond, get operations back on track and contain the damage. You think...

Wipeout: The Rise of Data Destruction Malware

Imagine that you’ve been hit by a cyber attack. You’re scrambling to respond, get operations back on track and contain the damage. You think...

Top Cyber Threats in Manufacturing

The manufacturing sector continues to be the top target worldwide for cybercrime. With nearly 5,500 successful ransomware attacks on organizations in 2024, cybercrime remains...

An offline Vault

The cloud is big and welcoming, but it’s not enough as cyberattackers go after backups. The rules for backing up critical data and systems...

What You Can’t Forget When Crafting Your Cyber Strategy

When building and maintaining a comprehensive cyber defense strategy, seemingly simple measures — such as having crucial phone numbers written down on paper —...

Protecting Against Third-Party and Vendor Compromise: MxD Cyber with Boeing

Stephanie Hinnerschietz, Boeing Enterprise Security Supplier Incident Focal...

Understanding Cyber Insurance: Interview with Michelle Chia of AXA XL

With cyber intrusions on the rise and costly ransomware incidents making headlines, more companies are seeking to manage risks by purchasing cyber insurance coverage....