Latest cyber security publications
Cyble found problems with “multiple DCIM software, intelligent monitoring devices, thermal cooling management controls systems and rack power monitors vulnerable to cyberattacks.”
‘how can you make sure that the pipeline that you’re building is secure in itself? I see solutions that don’t exist today, existing in a number of years, that will really help.’
The imperatives of the Cyber Security Strategy and the new legislation in reporting breaches signifies an era of intensified vigilance and transparency for the UK. Add to this the directive to feed a talent-pipeline and the government’s ambition for a tech’ ecosystem, that will reinvigorate the economy, becomes a virtual reality.
From stealing the plans for Apple products from supplier Quanta Computer to attacking the world’s largest meat processing company, JBS, resulting in major disruptions; REvil have demonstrated the damage ransomware can cause.
On Wednesday, December 22, Amazon Web Services (AWS) experienced a power outage that affected services for enterprise clients such as Slack, Epic Games, and Imgur. Amazon blamed the interruption of service on a power issue in an East Coast data centre, affecting one Availability Zone in the region.