The field of cybersecurity didn't lose any of its dynamism during the first half of 2022.
ITPro Today readers paid close attention to Russia’s invasion of Ukraine, which has involved cyberattacks that could increasingly spill over into other countries. We explored the conflict in several articles, including a story about how Ukrainian data center and network engineers worked to preserve Ukraine's communications infrastructure.
Apart from staying on top of cybersecurity news, readers sought tips for using encryption, preventing ransomware attacks, and hardening their IT environments. Ransomware proved to be a threat that many are trying to finally stamp out.
Here is a rundown of our top cybersecurity stories of 2022.
U.S. tech companies responded to Russia's Ukraine invasion with a boycott. Read about the large-scale technological isolation of Russia’s 145 million people.
Storing PowerShell scripts on your network can create a range of risks. PowerShell expert Brien Posey explains how to protect sensitive scripts by encrypting them.
Further Reading: What Is Data Encryption?
Microchip in May updated its Trust Shield root of trust product. Learn about advances in silicon security and why server manufacturers and hyperscalers are investing in root of trust technology.
Gartner has pointed to machine identity management as a critical component of security operations. This article explains what a machine identity is and why managing machine identities is important.
Many organizations’ Active Directory environments are sitting ducks for cyberattackers. A report from Semperis highlighted areas of Active Directory security that need improvement.
Cybercriminals will use fake Windows updates to dupe their victims into downloading ransomware. Here are tips for spotting this form of attack.
Further Reading: How To Spot the Warning Signs of Ransomware Attacks
The RSA Conference provides newcomers with an opportunity to showcase their security technologies. Read this roundup of notable startups.
Further Reading: Security Product Innovations Run the Gamut at RSAC 2022
Security tools such as Impacket penetration testing software were used in cyberattacks against Ukrainian organizations. Learn how criminals take advantage of security products to do harm.
As Russia invaded Ukraine, the Ukrainian government worked hard to protect its communications infrastructure. This article tells the story of Ukrainian data center and network engineers trying to keep their country connected.
Windows 11 introduced Dynamic Lock, a security feature that logs out users when they physically leave their computers. Here’s how Dynamic Lock works and how to enable it on your system.
Further Reading: Microsoft Details New Security Features for Windows 11
More highlights in cybersecurity new:
- State Department Announces Bureau of Cyberspace and Digital Policy
- Google Cloud buys the ‘Navy Seals of Cybersecurity’
- 70 Percent of Breached Passwords Still in Use
- NSA Says ‘No Backdoor’ for Spies in New U.S. Encryption Scheme
- Walmart Security Chief Criticizes Data Breach Prevention Strategies
- Top U.S. Websites Run Afoul of European Data Privacy Law
Other notable security tips and insight:
- Who Needs Cloud Infrastructure Entitlement Management?
- 5 Types of Cybersecurity Skills That IT Engineers Need
- Securing VM Workloads in the Cloud
- 6 Mobile Security Tips for Hybrid Workforces
- Accelerometer Data and Its Security Implications
- 10 Enterprise Applications for Blockchain Technology
- What To Do When Windows Defender Is Not Working
- How To Get Started With IoT Device Security