IT

Bridging the Gap: The Challenges of IT and OT Convergence
Operational Technology (OT) networks and Industrial Control Systems, the backbone of critical infrastructure, have traditionally operated in isolation and designed more for reliability and efficiency than security. The increasing convergence of IT ...

AI Could Help Resolve IT/OT Integration Security Challenges
Security issues stemming from the integration of information technology (IT) and operational technology (OT), could be addressed through artificial intelligence (AI), although the technology could also be leveraged by malicious actors, according ...

Permiso Launches Universal Identity Graph to Advance Zero-Trust IT
Permiso today added a Universal Identity Graph engine that makes it simpler for cybersecurity teams to visually map the relationship between individuals, applications and systems to better enforce zero-trust IT policies ...

Operational Technology (OT) Security a Top Priority for CIOs
The convergence of operational technology (OT) and information technology (IT) networks has created a complex environment increasingly vulnerable to cyberattacks, a challenge compounded by a backlog of legacy systems, an expanding attack ...

The Great CrowdStrike Crash, AI’s Role in Employee Smiles
In episode 341, we cover the unprecedented global IT outage caused by a CrowdStrike update crash, affecting 8.5 million Windows machines. We discuss whether it’s the largest outage in history and discuss ...

Survey: Nearly Half of SMEs Fell Victim to Cyberattack in Last Six Months
A survey shows that nearly half of all small-to-medium enterprises (SMEs) fell victim to cyberattacks in the first half of this year ...
Why Is Reliable Software Surprising?
Software comes in all shapes and sizes: monolith applications, small utilities, run-of-the-mill middleware, web platforms, mobile apps, etc.. But it seems like finding one that actually “just works” as advertised is increasingly ...

Survey Surfaces Lack of Confidence in Security Tools
A global survey of more than 1,033 security and IT leaders published today finds nearly two-thirds (65%) lack confidence that their existing security tooling cannot effectively detect breaches ...
What is Proxmox VE – and Why You Should Live Patch It
Proxmox VE, like any software, is vulnerable to security threats. Patching helps address these vulnerabilities, protecting your virtual machines from attacks. Traditional patching methods often require taking systems offline, leading to downtime ...
Implementing Risk Compliance and Management in Linux Systems: A Practical Guide
Regular security audits and up-to-date patch management are essential for Linux compliance. User access control and robust network security are critical to safeguard Linux systems. Adapting compliance frameworks like ISO 27001 to ...