Supply Chain Economics and Cybersecurity
· Cybersecurity

Supply Chain Economics and Cybersecurity

Let’s face it, supply chains are complex and distributed. Operations matter, and for some it is truly a miracle how many coordinated parts come together into a seamless operation. In fact, some manufacturers have tens of thousands of suppliers, from raw materials to hardware to firmware to software and everything in between. As companies continually […]

Read more →
Embracing DevSecOps with Automated Software Binary Security
· Cybersecurity

Embracing DevSecOps with Automated Software Binary Security

DevOps came about with the understanding that software development and information technology operations work together to improve deployment frequency, while maintaining service stability. In this process, security was not often part of an original build, but rather “bolted on” afterwards. The new (and better) thinking is DevSecOps, which removes security from its silo and incorporates […]

Read more →
The Lottery You Don’t Want to Win: Introducing the RunSafe Pwn Index™
· Cybersecurity

The Lottery You Don’t Want to Win: Introducing the RunSafe Pwn Index™

Financial instruments have given enterprises good tools and processes by which to manage their risk, but there is absolutely no limit to the amount of threat intelligence that security teams can benefit from having at their disposal. To help enterprise security teams reduce risk even more, we’ve just announced the release of the RunSafe Pwn […]

Read more →
Beating Vendor Fatigue: Considerations for Choosing the Right Cybersecurity Provider
· Cybersecurity

Beating Vendor Fatigue: Considerations for Choosing the Right Cybersecurity Provider

Organizations often perceive cybersecurity as a necessary evil. They know that it’s critical to protect business assets but it’s seldom seen as a driver that helps move the business forward. It’s a checkbox, a requirement that is begrudgingly addressed to reduce risk and remain in compliance. There are massive amounts of dollars and people-hours that go […]

Read more →
CEO Insights: Why Cybersecurity is an enablement of IIoT
· Cybersecurity

CEO Insights: Why Cybersecurity is an enablement of IIoT

Lucian Fogoros: How would you rate the level of cybersecurity awareness among industry in general? What level of uptake do you see regarding the level of cybersecurity best practices and systems? Joseph Saunders: With the many reported attacks on utilities, SCADA systems, and operational technology, I’d have to say that the level of cybersecurity awareness […]

Read more →
The state of auto cybersecurity: current vulnerabilities in connected vehicles
· Cybersecurity

The state of auto cybersecurity: current vulnerabilities in connected vehicles

As the automotive industry adds more software and connections into vehicles, it simultaneously increases the probability of cyberattacks due to vulnerabilities. Right now, the average car has about 100 million lines of software code and 100 electronic control unit (ECUs), both of which provide hackers with a vast attack surface. And those two numbers are […]

Read more →
Top Four Methods to Protect Your Open Source Software
· Cybersecurity

Top Four Methods to Protect Your Open Source Software

What the “Old Ways” for Source Code Security Are Lacking Open source software, in its three decades of existence, has experienced rapid growth and adoption within the software development landscape—and for good reason. It differentiates itself from proprietary software in the fact that developers can inspect, copy, modify, and redistribute the software easier than ever […]

Read more →
Top five largest cyber-attacks in the past year and lessons learnt
· Cybersecurity

Top five largest cyber-attacks in the past year and lessons learnt

Sponsored by RunSafe Security Cyberattacks are becoming far too common, especially after the COVID-19 pandemic, as companies are changing how they’re doing business. Large cyber-attacks on enterprises’ software, in particular, have already affected millions of users. Unfortunately, these will continue to impact more people unless organizations take proper precautions to prevent cybercriminals from exploiting vulnerabilities. […]

Read more →
Are We Doing Enough to Secure the US Power Grid?
· Cybersecurity

Are We Doing Enough to Secure the US Power Grid?

An Executive Order from US President Donald Trump in May this year overhauled the backbone of the nation’s electricity infrastructure, highlighting gaps and vulnerabilities in the operations of power systems and bulk power equipment, to attacks by hackers, terrorists and other state adversaries. So, what can be done to secure the US power grid? The […]

Read more →
Maximize IIoT Device Profitability and Customer Satisfaction with Yocto
· Cybersecurity

Maximize IIoT Device Profitability and Customer Satisfaction with Yocto

To maximize IIoT device profitability and customer satisfaction, users can take a few simple steps to augment yocto’s robust platform with tooling to increase security and decrease update frequency, while still maintaining aggressive delivery timelines. Yocto is quickly becoming the de facto standard build environment for embedded devices. Its configurability and wide range of supported […]

Read more →
The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking
· Cybersecurity

The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking

12 million trucks, or about 5% of vehicles on U.S. roads, are aggregated into fleets for government or commercial use. About 42% of these are connected with telematics Fleet Management System (FMS) for efficiency and compliance with government Electronic Logging Data (ELD) requirements. Typical FMS data captured includes miles driven, time of day, Global Positioning System […]

Read more →
Answering your burning IIoT questions with Cyril Perducat, EVP of IoT & Digital Offers, Schneider Electric
· Connected Industry

Answering your burning IIoT questions with Cyril Perducat, EVP of IoT & Digital Offers, Schneider Electric

As any manufacturing company embarking on a digital transformation journey, you want to be more productive and more energy-efficient — all while managing the unknowns such as unpredictable market conditions, geopolitical/trade impacts, and ever-changing consumer demands. Whether large and small, industrial enterprises are looking to IIoT as a way to handle these variables within the […]

Read more →