China and other nation-state bad actors are probing the defenses of critical infrastructure worldwide and legacy or outdated systems are prime targets. The time to mitigate that risk is now.
Category: Defense
Best Practices For Pen Testing
Threat actors are leaping over traditional barriers with ease, demanding sharper defenses for our widening attack surfaces. They are constantly on the move, probing IT infrastructure to identify vulnerable systems – including unpatched endpoints, network misconfigurations, unsecured APIs, and long-forgotten cloud permissions. Keeping up with network changes and closing these security gaps is a never-ending, manual endeavor that saps IT resources, time, and morale. The result: unnecessary security risk. After all, you can’t secure what you don’t know about.
Free Self-Paced Courses from the Cisco Networking Academy
This introductory course takes you inside the world of cybersecurity. You will learn cybersecurity basics to protect your personal digital life and gain insights into the biggest security challenges companies, governments, and educational institutions face today. Cybersecurity professionals who can protect and defend an organization’s network are in high demand.
Navy tests using drones for medical supply deliveries during RIMPAC
As the Navy looks to further integrate drones into the manned fleet, the sea service assessed using unmanned aerial systems to deliver critical supplies to the destroyer Curtis Wilbur last month during the massive Rim of the Pacific military exercise.
Army testing ‘pocket-sized’ drones that could soon be in the hands of every squad | Fox News
The tiny drones, which have already deployed with units such as the Army’s legendary 82nd Airborne Division, are small and lightweight enough that a single soldier can carry the drone, controller, and batteries needed to operate the system as part of their standard combat load. Once in the air, the device can transmit live video and HD still images of the surrounding area.
Australian military to buy small US-made lethal drones being used by Ukrainian forces – ABC News
At present the ADF operates around 760 unmanned aerial systems mainly for surveillance missions, with some models capable of being armed. But the Defence department is also trialling low-cost, expendable systems which can be produced in vast numbers.
The US Wants to Integrate the Commercial Space Industry With Its Military to Prevent Cyber Attacks | WIRED
As space becomes more important to the world’s critical infrastructure, the risk increases that hostile nation-states will deploy cyberattacks on important satellites and other space infrastructure. Targets would include not just spy satellites or military communications satellites, but commercial spacecraft too.
To guard against cyberattacks in space, researchers ask “what if?” | Ars Technica
Because space is so remote and hard to access, if someone wanted to attack a space system, they would likely need to do it through a cyberattack. Space systems are particularly attractive targets because their hardware cannot be easily upgraded once launched, and this insecurity worsens over time. As complex systems, they can have long supply chains, and more links in the chain increase the chance of vulnerabilities. Major space projects are also challenged to keep up with best practices over the decade or more needed to build them.
From Phish to Phish Phishing: How Email Scams Got Smart – Check Point Blog
In short, malicious emails will become easier to create and more difficult to stop.