Two sides of IT vs. OT Security and ICS Security Operations
People, Process, & Technology on Two sides of the Same Coin Who should perform the security of the operations technology (OT) and industrial control system (ICS) in any given company? This is a question I commonly…
Impact to large-scale implementations: Smart factories and smart cities
In this article we discuss how insecure deployments and the lack of well-defined security in M2M technology can be abused to turn into unforeseen problems in critical and large-scale environments like smart factories and cities.M2M technology…
Oversight and Management of Cybersecurity Risks for Board of Directors/Decision Makers
As IoT cybersecurity threats increase in both severity and frequency, every
The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking
12 million trucks, or about 5% of vehicles on U.S. roads, are aggregated into fleets for government or commercial use. About 42% of these are connected with telematics Fleet Management System (FMS) for efficiency and compliance with…
Finding Security in an IIoT Driven World
It wasn’t that long ago that IIoT sounded out of reach. Who would have imagined we could control our home’s thermostat or turn on the sprinklers from anywhere in the world? The truth is, while it…
Cultivating Security in the Food Production Industry
In the food production industry, high-tech tools and systems are being used to optimize production conditions. But new technology brings new challenges and risks. The world population is expected to reach 9.8 billion in 2050, according…
A new partnership for ICS Cybersecurity and security of Smart Cities
The IoT Security Institute (IoTSI) announced this week that it has established a collaborative partnership with MEASC and Quill Security Technology. “This partnership acknowledges the increasing importance of a “time to act” approach to cybersecurity in smart cities and critical infrastructure…
DDoS Attacks on IoT. Doesn’t remind you of something… ?
It’s unfortunate that cybercriminals have many different ways of exploiting network vulnerabilities and weak spots in our cyber defenses. Considering that the number of devices we use on a daily basis is growing, more avenues of…
Vulnerabilities in Smart Alarms Can Let Hackers Hijack Cars
Vulnerabilities in third-party car alarms managed via their mobile applications were uncovered by security researchers at Pen Test Partners. The security flaws reportedly affect around 3 million cars that use these “smart” internet-of-things (IoT) devices. Here’s what you need to…
The Lottery You Don’t Want to Win: Introducing the RunSafe Pwn Index™
Financial instruments have given enterprises good tools and processes by which to manage their risk, but there is absolutely no limit to the amount of threat intelligence that security teams can benefit from having at their…