
ICS security: what we should be aware of and what we should expect?
For organizations and entities that have a zero downtime modus operandi, insuring that cyber threats are mitigated without taking systems offline is critical. During this interview, IIoT World’s Chief Innovation Officer, Greg Orloff, dives in with…

One of Deutschland’s Iconic Businesses Addresses the Issue of Trust, Directly
What does it mean to trust someone or something? To my way of thinking, trust is having confidence that a person or organization will take actions that ensure my safety while aligning with my beliefs, expectations,…

IoT Security – Game of Trust
When it comes to prominent technologies that are certain to rule the world and our everyday lives in the future, IoT is one of those that have a profound impact. We use this technology daily, and…

What the Industry’s First Coleopteran Chief Vulnerability Officer Predicts for 2019
Let’s not beat around the bug – 2018 was not a good year for my kind. As of now, nearly one in three computers was hit with a malware attack this year, and ransomware attacks were up…

Machine-to-Machine (M2M) Technology Design Issues and Implementation Vulnerabilities
In our latest research paper, titled “The Fragility of Industrial IoT’s Data Backbone: Security and Privacy Issues in MQTT and CoAP Protocols” and written with Rainer Vosseler and Davide Quarta, we discussed how MQTT and CoAP…

The Future of the ICS Security Market Revealed
Cue the music for the big reveal (Duhn Duhn Duhnnnnn)!!! As we approach the end of 2018, you will undoubtedly begin to see lots of articles and posts on the year in review, predictions for what the…

Insiders – the biggest security threat to their organizations
It was only a matter of time before what befell the Information Technology (IT) community was going to affect the Operational Technology (OT) community. Today, the OT C-suite is saddled with agenda items keeping them up…

Three Days of Insight into the Rebirth of Michigan – Cybersecurity
Day One As a proud graduate of The Ohio State University, when I think of Michigan, several things come to mind…but tossing aside for a moment the rivalries of one’s sports-related youth, the images that surface…

A better security for critical infrastructure using strong authentication
November is National Critical Infrastructure Security and Resilience Month so I thought it would be a great opportunity to discuss some of the security challenges concerning critical infrastructure, specifically the weak access controls in sensitive operational…

IIoT Security: Obscure, Encrypt and Design Wisely
With data being the “new oil,” now more than ever it needs securing. This is especially true when it is coming from the manufacturing floor and as part of the Industrial Internet of Things (IIoT). A single successful cyber…