
Embracing DevSecOps with Automated Software Binary Security
DevOps came about with the understanding that software development and information technology operations work together to improve deployment frequency, while maintaining service stability. In this process, security was not often part of an original build, but…

MQTT and CoAP: Security and Privacy Issues in IoT and IIoT Communication Protocols
Machine-to-machine (M2M) communication protocols, which enable machines to “talk” with one another so that commands are communicated and data is transmitted, are indispensable to applications and systems that make use of the internet of things (IoT) and the industrial…

IoT Security: The Visibility of Assets in the Field
IoT security is a complex issue, especially in projects involving hundreds of edge devices in the field. Cloud security and edge security are two very different issues. Edge systems are isolated, and if there is a network…

Two sides of IT vs. OT Security and ICS Security Operations
People, Process, & Technology on Two sides of the Same Coin Who should perform the security of the operations technology (OT) and industrial control system (ICS) in any given company? This is a question I commonly…

Impact to large-scale implementations: Smart factories and smart cities
In this article we discuss how insecure deployments and the lack of well-defined security in M2M technology can be abused to turn into unforeseen problems in critical and large-scale environments like smart factories and cities.M2M technology…

Oversight and Management of Cybersecurity Risks for Board of Directors/Decision Makers
As IoT cybersecurity threats increase in both severity and frequency, every

The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking
12 million trucks, or about 5% of vehicles on U.S. roads, are aggregated into fleets for government or commercial use. About 42% of these are connected with telematics Fleet Management System (FMS) for efficiency and compliance with…

Finding Security in an IIoT Driven World
It wasn’t that long ago that IIoT sounded out of reach. Who would have imagined we could control our home’s thermostat or turn on the sprinklers from anywhere in the world? The truth is, while it…

Cultivating Security in the Food Production Industry
In the food production industry, high-tech tools and systems are being used to optimize production conditions. But new technology brings new challenges and risks. The world population is expected to reach 9.8 billion in 2050, according…

A new partnership for ICS Cybersecurity and security of Smart Cities
The IoT Security Institute (IoTSI) announced this week that it has established a collaborative partnership with MEASC and Quill Security Technology. “This partnership acknowledges the increasing importance of a “time to act” approach to cybersecurity in smart cities and critical infrastructure…