Tuesday, May 18, 2021

What the Colonial Pipeline ransomware attack suggests about critical infrastructure security

TechTalk

Catch up on IT news, learn coding tips and more

Tuesday in Tech

May 18, 2021

What the Colonial Pipeline ransomware attack suggests about critical infrastructure security

The largest fuel pipeline in the United States, Colonial Pipeline, halted operations because of a ransomware attack. The attack was carried out by the cybercriminal group DarkSide. Much of the pipeline remains offline, although the pipeline operator aims to restore service by the end of the week. Mark Weatherford is the CISO at AlertEnterprise, Chief Strategy Officer at the National Cybersecurity Center and the former Deputy Under Secretary for Cybersecurity at the U.S. Department of Homeland Security. He joins Juliet to discuss what the Colonial Pipeline attack suggests about the state of critical infrastructure security, national security concerns and what steps critical infrastructure companies should take to secure their enterprise.

Image: M1 iPad Pro outperforms Intel MacBook Pro in early benchmarks

M1 iPad Pro outperforms Intel MacBook Pro in early benchmarks

Early benchmarks suggest that the soon-to-be-shipped M1 iPad Pro is much faster than the previous generation iPad Pro, as well as the 16-inch MacBook Pro with Intel Core i9 processor. Computerworld executive editor Ken Mingis and Macworld executive editor Michael Simon join Juliet to discuss the benchmark results, whether or not it's worth it to ditch your MacBook Pro for an iPad and the enterprise use case for an M1 iPad Pro.

How to investigate a Windows network breach

These are the most important actions to take once your Windows network is breached.

ICYMI: How to recover your system from a ransomware attack

After infecting a system with Locky Ransomware, CSO attempted to recover it using basic tools and backups.

Using the switch/case syntax | Smart Go

Learn about Go's switch/case construction, making it easy to choose one code path among many based on the value of a variable -- or even its type.

How to use the traceroute command: 2-Minute Linux Tips

In this Linux tip, learn how to use the traceroute command. It reports on the route taken to reach a remote system and provides timing details for each "hop" along the way (the time between routers).

TechTalk
Facebook Twitter LinkedIn
© 2021 TechTalk
140 Kendrick Street, Building B
Needham, MA 02494

No comments:

Post a Comment

Private investors pour $50 billion into booming sector… investment opportunity

Unstoppable megatrend driven by hundreds of billions in government spending ...