<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2849132&amp;fmt=gif">

Press Coverage

Elisity in the News

ISMGMay 13

Russian Attacks on Polish Water Utilities Use Fear as Weapon

A spate of pro-Russian hacktivists attacks against Polish water facilities have illuminated a debate about the best way to defend water utilities and other critical

Shaun Waterman·ISMG

Russian Attacks on Polish Water Utilities Use Fear as Weapon
Read article →
Manufacturing Business TechnologyMay 12

Why Manufacturer's Microsegmentation Strategies are Failing

Keeping pace with architectural changes has proven challenging.

Staff·Manufacturing Business Technology

Why Manufacturer's Microsegmentation Strategies are Failing
Read article →
Digital Health InsightsMay 11

What could Claude Mythos mean for healthcare cyber risks?

Anthropic chose not to release its new, powerful model because of the cybersecurity risks it poses critical infrastructure software.

Carrie Pallardy·Digital Health Insights

What could Claude Mythos mean for healthcare cyber risks?
Read article →
Industrial CyberMay 11

Polish ABW warns cyberattacks shifting from espionage and data theft toward physical disruption of critical infrastructure

Polish ABW warns cyberattacks shifting from espionage and data theft toward physical disruption of critical infrastructure.

Anna Ribeiro·Industrial Cyber

Polish ABW warns cyberattacks shifting from espionage and data theft toward physical disruption of critical infrastructure
Read article →
ISSSourceMay 8

Attacks on Water Plants in Poland

Attacks on water plants in Poland last year showed the threat actors were able to gain access to industrial control systems in some cases.

Gregory Hale·ISSSource

Attacks on Water Plants in Poland
Read article →
ComplexDiscoveryMay 6

CISA’s CI Fortify rewrites the disconnection playbook for critical infrastructure

CISA's CI Fortify directs U.S. critical infrastructure to plan for isolation and recovery during cyber conflict — implications for cybersecurity, IG, eDiscovery.

ComplexDiscovery

CISA’s CI Fortify rewrites the disconnection playbook for critical infrastructure
Read article →
CYBR.SEC.MediaMay 6

Medical Device Cybersecurity in 2026: More Investment, More Attacks, More Harm

New survey results show that medical device procurement standards are tightening and budgets are growing, yet organizations are not keeping pace with threat actors as their attacks become more frequent. And the security gap between legacy and newly deployed devices isn’t closing.

George V. Hulme·CYBR.SEC.Media

Medical Device Cybersecurity in 2026: More Investment, More Attacks, More Harm
Read article →
CSOMay 5

CISA pushes critical infrastructure operators to prepare to work in isolation

The new CI-Fortify initiative urges critical infrastructure operators to prepare for cyberattacks by ensuring they can disconnect from networks and still deliver essential services — something experts say will hinge on investment and discipline.

Cynthia Brumfield·CSO

CISA pushes critical infrastructure operators to prepare to work in isolation
Read article →
ISMGMay 1

Medtronic Already Facing Federal Lawsuits in Recent Hack

Medtronic is already facing at least a half-dozen proposed class action lawsuits filed in federal court just days after the medical device maker confirmed that

Marianne Kolbasuk McGee·ISMG

Medtronic Already Facing Federal Lawsuits in Recent Hack
Read article →
ISSSourceMay 1

Microsegmentation Works, but Usage Lacking

Microsegmentation works, but usage lacking as over 90 percent have protected fewer than 80 percent of their critical systems.

Gregory Hale·ISSSource

Microsegmentation Works, but Usage Lacking
Read article →
The EdvocateApr 29

Bridging the Gap: The Need for Effective Microsegmentation in Cybersecurity

Spread the loveIn an era where cyber threats are increasingly sophisticated, organizations are striving to enhance their cybersecurity frameworks. A recent survey conducted by Omdia and commissioned by Elisity highlights a significant discrepancy between the intentions of cybersecurity leaders and the actual implementation of essential protective measures. The survey reveals that while an overwhelming 99% of security leaders advocate for the deployment of microsegmentation, a staggering over 90% have managed to protect less than 80% of their critical systems. Understanding Microsegmentation Microsegmentation is a vital security strategy that divides networks into smaller, more manageable segments. This approach minimizes the attack […]

Matthew Lynch·The Edvocate

Bridging the Gap: The Need for Effective Microsegmentation in Cybersecurity
Read article →
Industrial CyberApr 29

Survey finds 99% back microsegmentation but over 90% fall short on protecting critical systems

Elisity commissioned Omdia survey finds 99% back microsegmentation but over 90% fall short on protecting critical systems.

Industrial Cyber News Desk·Industrial Cyber

Survey finds 99% back microsegmentation but over 90% fall short on protecting critical systems
Read article →
TechTargetApr 28

Legacy architecture, awareness gaps stifle microsegmentation adoption in healthcare

System complexity, legacy architecture and awareness gaps hinder healthcare

Jill Hughes·TechTarget

Legacy architecture, awareness gaps stifle microsegmentation adoption in healthcare
Read article →
BriefGlanceApr 28

The Security Paradox: Why 90% of Firms Fail at Microsegmentation

A new survey reveals a massive gap between security goals and reality, as nearly all firms want microsegmentation but few successfully deploy it.

BriefGlance

The Security Paradox: Why 90% of Firms Fail at Microsegmentation
Read article →
Digital IT NewsApr 28

Microsegmentation Report: Omdia Finds 90% Falling Behind Despite Strong Demand

Microsegmentation report shows 99% of 352 leaders want deployment, but only 9% have secured over 80% of critical systems.

Taylor Graham·Digital IT News

Microsegmentation Report: Omdia Finds 90% Falling Behind Despite Strong Demand
Read article →
CYBR.SEC.MediaApr 28

Omdia Survey Captures Microsegmentation Gap: Security Teams Know What They Need and Still Aren't Getting It Done

There's an all-too-common frustration that shows up in enterprise security survey results when the gap between a security team’s intentions and its execution leaves an opening for attackers to succeed.

George V. Hulme·CYBR.SEC.Media

Omdia Survey Captures Microsegmentation Gap: Security Teams Know What They Need and Still Aren't Getting It Done
Read article →
The HIPAA JournalApr 28

Healthcare Organizations Struggling to Implement Primary Method of Blocking Lateral Movement

A study of security leaders from the healthcare and manufacturing industries found that while there is an almost universal desire to deploy modern A recent study found that 99% of healthcare organizations have or plan to implement microsegmentation to protect against lateral movement, yet only 6% have done so on 80% or more of critical systems, despite half experiencing a lateral movement attack in the past 12 months.

Steve Alder·The HIPAA Journal

Healthcare Organizations Struggling to Implement Primary Method of Blocking Lateral Movement
Read article →
Cyber Insurance NewsApr 28

Microsegmentation Cyber Insurance Gap: 90% Of Organizations Are Falling Behind

Estimated reading time: 7 minutes Almost every security leader wants microsegmentation. Almost none of them have it. That is the central finding of a new

Martin Hinton·Cyber Insurance News

Microsegmentation Cyber Insurance Gap: 90% Of Organizations Are Falling Behind
Read article →
24x7 MagazineApr 28

Nearly Half of Healthcare Organizations Hit by Network Cyberattacks

Nearly half of healthcare security leaders experienced a lateral movement cyberattack in the past year, according to a new Omdia survey.

24x7 Magazine

Nearly Half of Healthcare Organizations Hit by Network Cyberattacks
Read article →
The CyberWire DailyApr 27

The Supreme Court sits on the geofence.

The Supreme Court weighs geofence warrants. Iran leans toward quieter cyber ops. Researchers unpack Fast16 sabotage malware. Microsoft tracks an Outlook outage. Snow malware moves deep inside networks. Itron reports a breach. SMS blasters hit Canada. Italy extradites an accused hacker to the U.S. Monday business brief. Our guest is Mick Coady, Field CTO of Elisity, on how hospitals can best defend against ransomware attacks. Meta’s relentlessly watchful eye turns inward.

Dave Bittner·The CyberWire Daily

The Supreme Court sits on the geofence.
Read article →
CSOApr 22

Anthropic bets on EPSS for the coming bug surge

As Anthropic’s Mythos signals a shift to unprecedented machine-speed vulnerability discovery, EPSS is gaining renewed attention to prioritize the coming waves of reports.

Cynthia Brumfield·CSO

Anthropic bets on EPSS for the coming bug surge
Read article →
Inc.Mar 31

6 High‑Growth San Jose Companies Land on Inc.’s 2026 Regionals List

Victoria Salves·Inc.

Inc.
Read article →
Dark ReadingMar 30

Manufacturing and Healthcare Share Struggles with Passwords

The two key economic sectors struggle with security for a reason: Many insiders view access management as a roadblock, while attackers see it as a way in.

Arielle Waldman·Dark Reading

Manufacturing and Healthcare Share Struggles with Passwords
Read article →
Industrial CyberMar 29

Rising ICS incidents drive shift from reactive risk models to intelligence-driven OT security strategies

Rising ICS incidents drive a shift from reactive risk models to intelligence-driven OT security strategies across organizations.

Anna Ribeiro·Industrial Cyber

Rising ICS incidents drive shift from reactive risk models to intelligence-driven OT security strategies
Read article →
Dark ReadingMar 23

Ransomware's New Era: Moving at AI Speed

Threat actors bypass security tools and use AI to launch faster ransomware attacks that exploit valid credentials and target data.

Arielle Waldman·Dark Reading

Ransomware's New Era: Moving at AI Speed
Read article →
CYBR.SEC.MediaMar 20

The Purdue Model Is Aging: Here's Why Operators Are Looking Toward 2.0

The Purdue Model has long been the GuideStar for securing factories, power plants, and water systems: layer your sensors at the bottom, controllers above, and tie it all to enterprise IT at the top with firewalls segmenting between. Simple. Effective. Or so the industry told itself.

George V. Hulme·CYBR.SEC.Media

The Purdue Model Is Aging: Here's Why Operators Are Looking Toward 2.0
Read article →
The CyberWireMar 18

Business Briefing for 03.18.26

Native launches with $42 million in funding.

The CyberWire Staff·The CyberWire

Business Briefing for 03.18.26
Read article →
CYBR.SEC.MediaMar 17

America's Medical Hardware Is a Battlefield

Many medical devices have expected lifespans measured in decades, and the majority of connected medical devices currently in use wouldn't meet the FDA's latest cybersecurity standards if submitted for approval. Adversaries have noticed.

George V. Hulme·CYBR.SEC.Media

America's Medical Hardware Is a Battlefield
Read article →
ISMGMar 13

How Main Line Health Secures Devices With Microsegmentation

An identity-based microsegmentation deployment at Main Line Health in Philadelphia is helping to control how its roughly 60,000 devices communicate across the

Marianne Kolbasuk McGee·ISMG

How Main Line Health Secures Devices With Microsegmentation
Read article →
BetaNewsMar 12

Healthcare organizations struggle to protect medical and IoT devices

A new study shows that connected medical and IoT devices have created an expanded attack surface, resulting in new attack vectors that cybercriminals exploit

Ian Barker·BetaNews

Healthcare organizations struggle to protect medical and IoT devices
Read article →
HIT Consultant MediaMar 11

HIMSS Survey: 60% of Health Systems Can't Protect Unmanaged Medical Devices

A new HIMSS and Elisity report reveals the "Implementation Paradox": hospitals desperately need microsegmentation to secure IoMT devices

Fred Pennic·HIT Consultant Media

HIMSS Survey: 60% of Health Systems Can't Protect Unmanaged Medical Devices
Read article →
ForbesMar 10

Inside The Top Private Infra Companies Taking Advantage Of The AI Boom

The AI capex boom will roll on in 2026, driving demand for innovation that can help build the next generation of cloud, communications, and AI infrastructure.

R. Scott Raynovich·Forbes

Inside The Top Private Infra Companies Taking Advantage Of The AI Boom
Read article →
Healthcare InnovationMar 5

Future of Cyber Defense in Healthcare: Micro Segmentation, AI, and Strategic Leadership

Healthcare organizations are adopting faster, more integrated cybersecurity tools to address resource constraints and improve threat detection

Pietje Kobus-McAllister·Healthcare Innovation

Future of Cyber Defense in Healthcare: Micro Segmentation, AI, and Strategic Leadership
Read article →
ISSSourceMar 4

Attack on Iran: Industry on Alert

Attack on Iran: Industry on alert for potential retaliatory attacks against critical infrastructure against the U.S. and its allies.

Gregory Hale·ISSSource

Attack on Iran: Industry on Alert
Read article →
Defense OneFeb 28

Strikes on Iran will test US cyber strategy abroad, and defenses at home

The federal government’s cyber defense agency is short-staffed, and Tehran is known for its retaliatory cyberattacks.

David DiMolfetta·Defense One

Strikes on Iran will test US cyber strategy abroad, and defenses at home
Read article →
Dark ReadingFeb 27

Life Mirrors Art: Ransomware Hits Hospitals on TV & IRL

HBO

Nate Nelson·Dark Reading

Life Mirrors Art: Ransomware Hits Hospitals on TV & IRL
Read article →
ISMGFeb 25

Medical Device Maker Reports Data Theft Hack to SEC

UFP Technologies, a Massachusetts-based maker of single-use medical devices and other healthcare supplies, has notified the U.S. Securities and Exchange Commission

Marianne Kolbasuk McGee·ISMG

Medical Device Maker Reports Data Theft Hack to SEC
Read article →