Welcome to Cyberstrike Brief, your source for the latest cybersecurity insights in smart manufacturing.

Latest In Cybersecurity

High-Profile Cyberattacks Dent CISOs’ Crisis Confidence, Sparking Surge in 2025 Crisis Simulation Budgets

In the aftermath of 2024’s high-profile cybersecurity incidents, CISOs are reassessing their organisation’s readiness to manage a potential  “chaos” of a full-scale cyber crisis.  

Keeper Security Insight Report: Navigating a Hybrid Authentication Landscape

This report explores the evolving strategies organizations are using to secure sensitive data and identities in an increasingly complex digital environment.

NCC Group Research Finds December 2024 Breaks Records with the Highest Ever Monthly Ransomware

A total of 574 attacks were recorded in December 2024, an increase from November 2024’s figure of 565 and December 2023’s figure of 387.

Persona unveils significant advances in detection of AI-based face spoofs

These updates strengthen Persona’s ability to detect and prevent increasingly sophisticated generative AI fraud techniques.

How Cyberattacks Are Threatening America’s Critical Infrastructure

The aging U.S. electric grid, coupled with advanced cyber threats, puts the nation’s energy security at serious risk, requiring immediate defense strategies.

Rocket Software Introduces Phishing-Resistant Solution for Secure Host Connectivity

This new solution provides comprehensive protection against threats like fake workers and phishing attacks, while helping organizations achieve regulatory compliance through multi-layered security features.

Concentric AI Introduces Private Scan Manager to Bring its AI-Powered Data Security Governance Platform to Organizations Requiring Onsite Data Processing

Organizations now have the flexibility to leverage AI-driven data security governance with data processing onsite for greater control, or in the Concentric AI cloud for speed and scalability.

Userful Achieves SOC 2 Certification, Reinforcing Security and Compliance for Control Rooms and Mission Critical Operations

This certification underscores its commitment to secure data management and compliance in critical operations environments.

Entrust Streamlines PKI, Certificate Lifecycle Management, and Automation With PKI Hub

Entrust PKI Hub is a solution comprising all the components required to operate a secure, post-quantum-ready PKI, protect a wide range of applications, and expand on demand.

Radiant Logic Premiers Real-Time Data Lake Visibility to Dramatically Improve Identity Security Posture Management (ISPM)

Powered by the first Real-Time Data Lake for identity data, Identity Observability marks the industry’s first data-centric approach to identity-first security.

Download the Latest Security Briefs

Mitigating Outage Risks: Three Inside-Out Strategies for CSOs

With carefully crafted strategies, CSOs can navigate the challenges of the digital age, safeguarding against costly outages and potential threats. Download this whitepaper to learn how.

Why Operational Technology Faces Greater Cybersecurity Risks

Download this whitepaper to learn how OT infrastructures present unique cybersecurity challenges, due in part to control by production teams.

Why Defense-in-Depth Is Crucial for Utility Cyber Protection

Download this whitepaper to learn how utilities are integrating multi-layered defense-in-depth strategies to improve cybersecurity and protect essential grid operations.

Mitigating Cybersecurity Risks as Climate Change Intensifies

Download this whitepaper to uncover the key issues at the convergence of climate change and cybersecurity, and explore
practical solutions to address them.

How Strengthening Cybersecurity Can Improve Overall Safety

Download this whitepaper to learn how manufacturing facilities can develop robust cybersecurity plans to combat increasing cyber threats and avoid devastating consequences.

How Manufacturers Can Tackle Cybersecurity Challenges in 2024

Download this whitepaper to explore the top cybersecurity threats facing manufacturers in 2024 and discover what steps to take to protect your operations.