Critical Infrastructure and ICS Security Remain a Network Segmentation Problem
Companies in every industry are developing and implementing connected industrial control applications as strategic digital business initiatives. However, the risks of security breaches and the subsequent impacts to consumer privacy and now personal safety are limiting…
The CANOPY WING Vulnerability: Weaponizing the Weakness
Finding a vulnerability, developing an exploit, and then launching (or not launching) this exploit – is repeated many times every day. Now more than ever companies must be aware of two perspectives: what a system is…
Staying secure in the smart era: Three rules for cybersecurity
Almost half of the manufacturers have fallen victim to cybercrime, according to the Cyber Security Manufacturing Report 2018, published by EEF. One of the biggest challenges for manufacturers is choosing from the range of products and…
US Cities Exposed: Industries and ICS security
Today, 54% of the world’s population lives in urban areas, a proportion that is expected to increase to 66% by 2050. [2] According to the 2010 US Census, that number is even higher in the US,…
CEO Insights: Why Cybersecurity is an enablement of IIoT
Lucian Fogoros: How would you rate the level of cybersecurity awareness among industry in general? What level of uptake do you see regarding the level of cybersecurity best practices and systems? Joseph Saunders: With the many…
Protect Critical Infrastructure With Runsafe Security’s Alkemist
Hackers are having increasing success penetrating the operating technology and industrial control systems underpinning data centers, utilities, manufacturing plants. As organizations incorporate smart devices, connect to the Internet of Things, and utilize the cloud to optimize…
A High Assurance Approach to Securing Network Infrastructure
The inconvenient truth is that our current cybersecurity tools and methods are not a match for today’s sophisticated attackers who will target any exposed surface looking for vulnerabilities. Attackers need to only succeed once, while defenders…
Automotive Security – A Security Assurance Framework for Automotive Industry
With the inter-connectivity of devices becoming ever more present in our lives, it’s vital to bring security standards up to par. In the automotive industry, this can be especially difficult owing to its many unique properties…
Are We Doomed to Repeat the Past When it Come to Hacking?
On an almost weekly basis, another organization or government agency owns up to having been “hacked” – admitting that its systems have been breached. For every company that discloses an issue, there are likely 20 –…
Commercial Availability of Self-Service Cyberhardening Technology
RunSafe Security, the pioneer of a patented cyberhardening process for vulnerable embedded systems, devices and industrial control systems (ICS), has announced the commercial availability of Alkemist, a proprietary self-service technology built to reduce vulnerabilities and deny malware…