
DDoS Attacks on IoT. Doesn’t remind you of something… ?
It’s unfortunate that cybercriminals have many different ways of exploiting network vulnerabilities and weak spots in our cyber defenses. Considering that the number of devices we use on a daily basis is growing, more avenues of…

Vulnerabilities in Smart Alarms Can Let Hackers Hijack Cars
Vulnerabilities in third-party car alarms managed via their mobile applications were uncovered by security researchers at Pen Test Partners. The security flaws reportedly affect around 3 million cars that use these “smart” internet-of-things (IoT) devices. Here’s what you need to…

The Lottery You Don’t Want to Win: Introducing the RunSafe Pwn Index™
Financial instruments have given enterprises good tools and processes by which to manage their risk, but there is absolutely no limit to the amount of threat intelligence that security teams can benefit from having at their…

Beating Vendor Fatigue: Considerations for Choosing the Right Cybersecurity Provider
Organizations often perceive cybersecurity as a necessary evil. They know that it’s critical to protect business assets but it’s seldom seen as a driver that helps move the business forward. It’s a checkbox, a requirement that is…

CxO Insights with Michael Murray: “The level of cybersecurity awareness is as high as I have ever seen it”
As connectivity to the outside world grows, security is becoming one of the most important topics in industrial IT and Operational Technology. In this interview, Michael Murray, SVP and GM Cyber Physical at BlackRidge Technology, responds to our questions focused on…

Securing IoT Medical Devices
With the expansion of the Internet of Things come increased cybersecurity concerns. The technology is finding its way into every industry, elevating connectivity and making our lives easier. However, there are downsides to this, and ever-growing…

Security Threats and Risks in Smart Factories
Smart factories are manifestations of how the industrial internet of things (IIoT) is changing traditional manufacturing. Organizations in the manufacturing sector already have a basic understanding of what smart factories are as well as their capabilities and the advantages…

Six Cybersecurity Predictions for Critical Infrastructure and the IIoT in 2019
Those of us who like to think about the future are always tempted to prognosticate at the beginning of a new year. Following are my top six cybersecurity predictions for 2019, based on the developments and…

The Common Vulnerability That Fintech and Bananas Share
Fintech is defined by technologies that span the cloud, mobile devices, blockchain, and AI for financial applications ranging from virtual currencies, to payment processing, money transfers, equity trading, and regulatory compliance, among others. There has been…

Security Architecture for Smart Factories
Building smart factories is a substantial endeavor for organizations. The initial steps involve understanding what makes them unique and what new advantages they offer. However, a realistic view of smart factories also involves acknowledging the risks and threats that may…