You searched for
cyberattacks
https://www.stormshield.com/news/twenty-years-of-cyber-attacks-on-the-world-of-water/
As a critical sector, water has had to contend with cyber threats for the past twenty years. A weapon of destabilisation between countries, public health... Cyber criminals have a thousand reasons for wanting to attack water. And not all countries seem to be equal when...https://www.stormshield.com/news/ten-major-cyberattacks-against-the-airport-industry/
The ultra-sensitive airport sector is garnering growing interest among cyber criminals. And computer threats against airports are also targeting planes, airlines… and actual passengers. Considering factors such as the financial cost of an immobilized fleet, the economic consequences of an airport operating at reduced speed,...https://www.stormshield.com/news/when-the-logistics-chain-is-subjected-to-cyberattacks/
Now that large companies have greater awareness of security, hackers are increasingly targeting contractors to achieve their goals. This “weakest link” strategy requires greater collaboration throughout the logistics chain. We explain. The logistics chain: a priority target for hackers The largest companies are tending...https://www.stormshield.com/news/cyberattacks-why-the-education-sector-is-not-immune/
From schools to universities or research labs, the whole education sector is a huge pool of sensitive data. It therefore needs to be protected. However, the education sector is struggling to get to grips with the subject of cybersecurity. Background. In addition to the...https://www.stormshield.com/news/the-food-industry-a-new-target-for-cyberattacks/
The cyberattack against Fleury Michon in France seems to support what had previously been suspected: that agri-food industries are the new targets for cyberattackers. And this is no coincidence, given their strategic nature. Issues, risks and counter-measures: we review the situation. The date is 15th...https://www.stormshield.com/ressourcescenter/webinar-reacting-to-cyberattacks/
Faced with the sophistication of such attacks and the inventiveness displayed by hackers when they come to getting around protective systems, it’s necessary to combine several means of defence. After introducing vulnerability management and effective network protection, a rapid response to such incidents is your...