Innovation Review: Transport Layer Security during the IoT Forum
This week together with our Chief Innovation Officer, Greg Orloff, a new addition to our team, I was in Silicon Valley, at the IoT World Conference and also attended the IoT Forum, a community that meets…
Why food & beverage companies should crack down on Cyber threats to ICS
When we buy groceries at the supermarket, most of us check the ingredients and expiration dates of packaged goods. But how can we be sure that the products we bring home are safe to eat and…
RSA Conference in Review – “Securing What Matters”
Coming off of San Francisco’s RSA Conference, the best way to describe the event is “sensory overload.” An estimated 45,000 technology and cybersecurity professionals descended upon Moscone Center – but the crowds overflowed into local bars,…
The Importance of Security by Design for IoT Devices
We’re on the verge of an explosion of IoT-related products and services and the security for IoT devices is a concern. We all know that the Internet of Things or IoT has started to disrupt consumers,…
What you need to know about Cybersecurity when adopting IIoT solutions
According to an article published by Trend Micro: “in 2018, digital extortion will be at the core of most cybercriminals’ business model and will propel them into other schemes that will get their hands on potentially…
The ICS Security considerations checklist
As you evaluate ICS cyber security solutions to protect your critical infrastructure from threats, there are a few criteria your team must consider throughout the process. We’ve compiled a checklist to help you select a solution…
Hacking Level 0,1 devices can be more significant than Stuxnet
Last week, the cyber security focus was on the four natural gas pipeline companies that had their electronic data interfaces, not control systems, hacked. However, from a control and safety system perspective, I believe the more…
TPM – a Powerful, Inexpensive Security Building Block
There are two worlds of computer security – high-end systems and then everything else. Both high- and low-end systems typically employ “top-down” defenses to harden their attack surfaces. These are “software-only” security techniques. High-end and specialized…
Is OT Cybersecurity Better Bolted-On or Designed-In?
Power grid outages driven by malware, dam control system attacks, vehicle onboard system hijacking: recent incidents like these show how critical cybersecurity has become in connected operational technology. But if you think OT is “just IT…
IIC: The Endpoint Security Best Practices White Paper
The Industrial Internet Consortium published today the Endpoint Security Best Practices white paper. The intended audience includes industrial equipment manufacturers, integrators, and industrial equipment owners and operators. All can benefit by obtaining a clear description of what countermeasures…