The Clock is Ticking for a New Cyber Security Strategy
President Biden is walking into an embattled and in some ways grim cyber security picture. As we know, the end of 2020 brought to our attention a months-long global cyber-espionage campaign, The broader public will almost…
[White Paper]Protecting the Embedded and IoT Software Build Environment with Software Composition Analysis
Ensuring the quality, reliability and safety of software requires navigating a complex supply chain made up of engineers, operations managers, contractors, and independent software vendors (ISVs), along with open source software (OSS) providers. Oftentimes, device manufacturers…
After a Cybersecurity Attack Like SolarWinds: Rebuilding a Network
In a recent article in The Guardian regarding the SolarWinds cybersecurity attack, security technologist Bruce Schneier said, “We have a serious problem. We don’t know what networks they are in, how deep they are, what access they have,…
Digital Transformation: A One-Two Punch to Empower Employees and Protect Data
As the COVID-19 pandemic continues to impact business and the economy worldwide, companies in every industry are using a critical eye to prioritize their operations amidst shrinking budgets and a catalog of unknowns. This includes exploring…
Creating a Comprehensive Framework to Protect Operational Technology Assets
The ability to remotely manage systems including HVAC units, vehicle fleets, manufacturing equipment and other operational technologies (OT) is seen as a tremendous time and money saver. However, a failure to properly protect OT assets can…
[White Paper] Operational Technology Cybersecurity
The purpose of control system cybersecurity is to protect the control systems and the processes they monitor and control from electronic threats — that is, to “keep lights on and water flowing.” Networks are a support…
Insights into WP.29 and the Automotive Sector
Interview by Greg Orloff, Senior Analyst and CBDO with IIoT World and Ian Todd, IoT Practice Lead, Security Services with BlackBerry on WP.29 Visit this link for more information on WP.29 The UNECE World Forum for…
Industrial IoT Cybersecurity: Top Questions, Key Insights
Industrial and ICS Cybersecurity is a hot topic in the IoT context. Recent market research shows, IoT Devices of nearly 80% of manufacturing organizations experienced a cyberattack, costing $300K on average. Cybersecurity has also been slowing…
[White Paper] Strategic Investments to Secure Smart Manufacturers
Security is undergoing a digital transformation in the manufacturing industry. As the fusion of the cyber world and the physical world progresses, various security issues are mounting. Manufacturing executives must view security as a management issue,…
Are We Doing Enough to Secure the US Power Grid?
An Executive Order from US President Donald Trump in May this year overhauled the backbone of the nation’s electricity infrastructure, highlighting gaps and vulnerabilities in the operations of power systems and bulk power equipment, to attacks…