A High Assurance Approach to Securing Network Infrastructure
The inconvenient truth is that our current cybersecurity tools and methods are not a match for today’s sophisticated attackers who will target any exposed surface looking for vulnerabilities. Attackers need to only succeed once, while defenders…
Automotive Security – A Security Assurance Framework for Automotive Industry
With the inter-connectivity of devices becoming ever more present in our lives, it’s vital to bring security standards up to par. In the automotive industry, this can be especially difficult owing to its many unique properties…
Are We Doomed to Repeat the Past When it Come to Hacking?
On an almost weekly basis, another organization or government agency owns up to having been “hacked” – admitting that its systems have been breached. For every company that discloses an issue, there are likely 20 –…
Commercial Availability of Self-Service Cyberhardening Technology
RunSafe Security, the pioneer of a patented cyberhardening process for vulnerable embedded systems, devices and industrial control systems (ICS), has announced the commercial availability of Alkemist, a proprietary self-service technology built to reduce vulnerabilities and deny malware…
US Intelligence says Cyber Threat Warning Lights are Blinking Red
Why Industrial Operations are not Immune Recently, US intelligence chief Dan Coats remarked in a talk at the Hudson Institute that ‘the warning lights are blinking red again’ on cyber attacks, as they were before the…
The state of auto cybersecurity: current vulnerabilities in connected vehicles
As the automotive industry adds more software and connections into vehicles, it simultaneously increases the probability of cyberattacks due to vulnerabilities. Right now, the average car has about 100 million lines of software code and 100…
Is Malware hiding in your ICS Network?
Most industrial organizations still consider their ICS networks to be safe from common cyber threats that mainly target IT networks. However, two recent cryptocurrency mining incidents demonstrate that ICS networks are not “sterile” from unwanted software. Moreover, the…
Renewable resources can increase cyber threats
Renewable resources are good for the environment and reduce consumer costs but they are not a panacea to reducing electric grid cyber threats despite the prevailing view by many that renewable resources can reduce the cyber…
Critical infrastructure cyberattack risk: from emerging concept to harsh reality
The current landscape Cyberattacks targeting power grids and manufacturing plants in Europe over the past two years led me to believe that we would see the first major cyberattack on U.S. critical infrastructure in 2018. At…
How Do We Enhance Trust in Connected Things?
Is technology advancing and evolving faster than our collective mindset? It’s an interesting thought, and perhaps easy to confirm when you start considering connectivity. Today, we have the Internet of Things, and we enjoy the hyper-connectivity…