Golidlocks problem of mobile device security in organizations
Usability vs. Security The “Goldilocks and the three bears” story begins with a girl tasting porridge. The first bowl is too hot, the second is too cold, and the third…
The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking
12 million trucks, or about 5% of vehicles on U.S. roads, are aggregated into fleets for government or commercial use. About 42% of these are connected with telematics Fleet Management System…
The Common Vulnerability That Fintech and Bananas Share
Fintech is defined by technologies that span the cloud, mobile devices, blockchain, and AI for financial applications ranging from virtual currencies, to payment processing, money transfers, equity trading, and regulatory…
CEO Insights: Why Cybersecurity is an enablement of IIoT
Lucian Fogoros: How would you rate the level of cybersecurity awareness among industry in general? What level of uptake do you see regarding the level of cybersecurity best practices and…
The state of auto cybersecurity: current vulnerabilities in connected vehicles
As the automotive industry adds more software and connections into vehicles, it simultaneously increases the probability of cyberattacks due to vulnerabilities. Right now, the average car has about 100 million…
Binary randomization makes large-scale vulnerability exploitation nearly impossible
One of the main reasons cyber risk continues to increase exponentially is due to the rapid expansion of attack surfaces – the places where software programs are vulnerable to attack…
The Antidote to Industrial IoT’s Kryptonite
Today’s industrial infrastructure is stronger and smarter than ever before. As manufacturers seek greater scalability and efficiency, they’ve automated and digitized their machines to achieve unprecedented power. But these “super”…