sports (4)

31078641495?profile=RESIZE_400xMajor sporting events are popular targets for cyber attackers.  There are therefore plenty of risks for the Winter Olympics, which will take place next month in the Italian cities of Milan and Cortina d’Ampezzo.  What can we expect from the digital battle taking place behind the scenes of the sport?  Unit 42 from Palo Alto Networks has provided an excellent overview.[1]

Critical infrastructure is under constant pressure both domestically and internationally.  Global events, from climate summits

12975188261?profile=RESIZE_400xProfessional sporting events have been prime targets for violent attacks and terrorism, because of their large audiences.  In recent years, these events have become targets of cyberattacks as adversaries exploit venue operations to disrupt events, abuse payment systems for fraud, breach networks to steal data, and take advantage of how athletes interact with fans.

While game time is pivotal, sports franchise operators and event organizers must also allocate resources to address many other vulner

12185127080?profile=RESIZE_400xJust recently, I have the opportunity to view a behind-the-scenes tour of security at Major Leage Baseball’s Fenway Park, home of the Boston Red Sox.  Even though the park is the oldest in major league baseball (1912), I was amazed in the use of high tech being employed in their security program.  Microsoft is now warning of the threat malicious cyber actors pose to stadium operations, warning that the cyber risk surface of live sporting events is "rapidly expanding."  "Information on athletic p

7224994052?profile=RESIZE_400xMilitary patrols working outside their forward operating bases (FOB) are categorized as “working outside the wire.”  This is often where reconnaissance patrols and military intelligence officers collect and gather valuable military intelligence to provide back to its unit, base, and section commanders to use in future proactive combat operations.  This is no different from what RedXray does in cyber security.  RedXray collects and analyzes indicators of compromise (IOCs) to help customers identi