Home i-SCOOP – latest articles

i-SCOOP – latest articles

The ransomware readiness gap and mitigation strategy challenge

Reports of ransomware attacks continue to occur in rapid succession. While organizations are more concerned than ever about software supply chain security threats and expanding attack surfaces, ransomware remains a fundamental cybersecurity challenge (with ransomware hackers increasingly leveraging the...

Smart manufacturing transformation priorities and challenges 2022 report

A look at the 2022 ISG Global Smart Manufacturing Pulse Survey and how the adoption of smart manufacturing evolves, including priorities and challenges. Over the past two years, organizations accelerated their digitization and digital transformation efforts in various domains at...

Report: 2022 will be a turning point for IoT security

IoT security remains one of the major security challenges for 2022 and years ahead. Still, organizations and buyers seem to move towards a conviction that security is foundational and not optional for connected devices and IoT projects. Cybersecurity concerns and...

Integrated Risk Management and the role of IRM software

Digital transformation and digitalization offer enormous opportunities. But they also bring many risks. The same applies to new technologies and the assets of the digital economy, with data at the center. The ongoing digitalization is one of many reasons why...

Splunk: top security issues facing the enterprise in 2022

Cyberattacks keep rising as cybersecurity becomes more complex and critical amidst ongoing digital transformation. A survey finds that around 65% of organizations reported an increase in attempted cyberattacks from mid-January through mid-February 2022. Especially supply chain attacks are on the...

German industry slow in adopting Industrial IoT – with consequences

In 2011, five years after being tasked to develop a new high-tech innovation strategy for Germany, the special working group for innovation policy came up with its recommendations for what has become known as Industry 4.0. The vision and concept...

Penetration testing in an increasingly complex digital world

Penetration testing is a security method whereby ethical hackers are asked to break into predefined IT systems or applications for specific cybersecurity purposes you decide. Organizations often combine this security assessment method, also known as pen testing (some prefer...

The attack surface and importance of attack surface management

The rapid and continuous expansion of organizations' attack surface and digital footprint has led to (external) attack surface management being one of the most important cybersecurity trends in 2022.  Attack surface management (ASM) is hot. In fact, several factors are...

Security and risk management as an inherent part of business

Cybersecurity has been defined as the strategy and practice of protecting computer systems, networks, applications, and data from digital attacks. Cybersecurity was – and often still is - primarily considered a technological matter, as this definition seems to indicate. But...

Supply chain attacks and security: state and outlook

Software supply chain attacks are a growing cybersecurity challenge. They become increasingly frequent and can have a more significant impact, affecting many organizations at once. Supply chain attacks are not new and fit in a broader evolution in which cyber...