US Intelligence says Cyber Threat Warning Lights are Blinking Red
Why Industrial Operations are not Immune Recently, US intelligence chief Dan Coats remarked in a talk at the Hudson Institute that ‘the warning lights are blinking red again’ on cyber attacks, as they were before the…
The state of auto cybersecurity: current vulnerabilities in connected vehicles
As the automotive industry adds more software and connections into vehicles, it simultaneously increases the probability of cyberattacks due to vulnerabilities. Right now, the average car has about 100 million lines of software code and 100…
Is Malware hiding in your ICS Network?
Most industrial organizations still consider their ICS networks to be safe from common cyber threats that mainly target IT networks. However, two recent cryptocurrency mining incidents demonstrate that ICS networks are not “sterile” from unwanted software. Moreover, the…
Renewable resources can increase cyber threats
Renewable resources are good for the environment and reduce consumer costs but they are not a panacea to reducing electric grid cyber threats despite the prevailing view by many that renewable resources can reduce the cyber…
Critical infrastructure cyberattack risk: from emerging concept to harsh reality
The current landscape Cyberattacks targeting power grids and manufacturing plants in Europe over the past two years led me to believe that we would see the first major cyberattack on U.S. critical infrastructure in 2018. At…
How Do We Enhance Trust in Connected Things?
Is technology advancing and evolving faster than our collective mindset? It’s an interesting thought, and perhaps easy to confirm when you start considering connectivity. Today, we have the Internet of Things, and we enjoy the hyper-connectivity…
Binary randomization makes large-scale vulnerability exploitation nearly impossible
One of the main reasons cyber risk continues to increase exponentially is due to the rapid expansion of attack surfaces – the places where software programs are vulnerable to attack or probe by an adversary. Attack…
The Antidote to Industrial IoT’s Kryptonite
Today’s industrial infrastructure is stronger and smarter than ever before. As manufacturers seek greater scalability and efficiency, they’ve automated and digitized their machines to achieve unprecedented power. But these “super” machines have a critical weakness –…
Blockchain: The Missing Link Between Security and the IoT?
The internet of things (IoT) has been associated with major cyberattacks, often involving the abuse of vulnerable connected devices, such as surveillance cameras, to facilitate malicious activities. Of course, concerns have been raised about the IoT’s…
Security is a shared responsibility between the end user and the cloud provider
As the security of your data is the most important factor when considering the use of cloud services, we will examine how data is protected at the client site, as it traverses public and private networks,…