Federico Maggi, Senior Researcher
· Our Contributors

Federico Maggi, Senior Researcher

With more than a decade of research experience in the cybersecurity field, Federico Maggi is specialized in doing threat and security analysis on virtually any system. Federico has analyzed web applications, network protocols and devices, embedded systems, radio-frequency control systems, industrial robots, cars, and mobile devices.He also has experience on defensive technology and research, through […]

Read more →
Working From Home? Here’s What You Need for Cybersecurity
· Cybersecurity

Working From Home? Here’s What You Need for Cybersecurity

There has been an influx of employees signing in remotely to corporate networks and using cloud-based applications. But this shift could also open doors to cybersecurity risks. Where should cybersecurity fit in? The current workplace reality is that, in response to the ongoing coronavirus (COVID-19) outbreak, many companies around the globe have rolled out work-from-home […]

Read more →
Industrial Cyber Security: Why IT & OT collaboration is no longer an option but a necessity
· Cybersecurity

Industrial Cyber Security: Why IT & OT collaboration is no longer an option but a necessity

Since the mid-1990s, many industrial companies have interconnected their industrial control systems (ICSs) to improve productivity, maintenance, and safety in the operational environment. Some of this interconnectivity was to  the Internet.  While, this connectivity helped to improved the efficiency, security was at best a minimal consideration. The lack of adequate security planning has resulted in […]

Read more →
Cybersecurity and Data Concerns in 5G
· Cybersecurity

Cybersecurity and Data Concerns in 5G

For the advantages of 5G to be unlocked, ample preparation and planning are necessary. Looking at the changes 5G networks might bring about on an enterprise and its security is a good place to start. One of the first areas of 5G security concerns is the amount of data collected and how it is interpreted. […]

Read more →
Real Threats Logs From a Smart Factory Honeypot
· Cybersecurity

Real Threats Logs From a Smart Factory Honeypot

Trend Micro just published the results of a six-month honeypot imitating an industrial factory. The highly sophisticated Operational Technology (OT) honeypot attracted fraud and financially motivated exploits. The six-month investigation revealed that unsecured industrial environments are primarily victims of common threats. The honeypot was compromised for cryptocurrency mining, targeted by two separate ransomware attacks, and […]

Read more →
Cybersecurity Predictions for 2020
· Cybersecurity

Cybersecurity Predictions for 2020

The year 2020 marks the transition to a new decade, and recent notable events and trends signify a similar changeover in the threat landscape. Cybersecurity in 2020 and beyond will have to be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to advancing technological developments and global threat intelligence — only […]

Read more →
How would you secure over 10 million IIoT devices?
· Cybersecurity

How would you secure over 10 million IIoT devices?

Industrial IoT (IIoT) devices will comprise the majority of the billions of IoT devices deployed over the next decade. How will the information security market meet this onslaught of technology? The consumer market is not a useful guide for this analysis. Consumers buy in small quantities and choose to deploy information security tools piecemeal. Few […]

Read more →
[Research] Securing Smart Factories in the Era of Industry 4.0
· Cybersecurity

[Research] Securing Smart Factories in the Era of Industry 4.0

Adopting Industry 4.0 means not only interconnecting IT and OT networks to build smart factories; it also means having shared responsibilities between IT administrators and OT engineers. These include accounting for assets such as equipment, underlying platforms, and protocols or services in use; assessing them for their criticality in the overall operations; and applying the […]

Read more →
MQTT and CoAP: Security and Privacy Issues in IoT and IIoT Communication Protocols
· Cybersecurity

MQTT and CoAP: Security and Privacy Issues in IoT and IIoT Communication Protocols

Machine-to-machine (M2M) communication protocols, which enable machines to “talk” with one another so that commands are communicated and data is transmitted, are indispensable to applications and systems that make use of the internet of things (IoT) and the industrial internet of things (IIoT).Message Queuing Telemetry Transport (MQTT) is a communication protocol widely used in both IoT and IIoT deployments. […]

Read more →
Impact to large-scale implementations: Smart factories and smart cities
· Cybersecurity

Impact to large-scale implementations: Smart factories and smart cities

In this article we discuss how insecure deployments and the lack of well-defined security in M2M technology can be abused to turn into unforeseen problems in critical and large-scale environments like smart factories and cities.M2M technology forms the core of IIoT systems for maintaining smart factories and building smart cities. As more of these connected […]

Read more →
Cultivating Security in the Food Production Industry
· Cybersecurity

Cultivating Security in the Food Production Industry

In the food production industry, high-tech tools and systems are being used to optimize production conditions. But new technology brings new challenges and risks. The world population is expected to reach 9.8 billion in 2050, according to a study published in 2017 by the United Nations Department of Economic and Social Affairs. The same study also shows […]

Read more →
Vulnerabilities in Smart Alarms Can Let Hackers Hijack Cars
· Cybersecurity

Vulnerabilities in Smart Alarms Can Let Hackers Hijack Cars

Vulnerabilities in third-party car alarms managed via their mobile applications were uncovered by security researchers at Pen Test Partners. The security flaws reportedly affect around 3 million cars that use these “smart” internet-of-things (IoT) devices. Here’s what you need to know about these vulnerabilities. [RELATED NEWS: Vulnerability in Key Fob Can Let Hackers Open Subaru Cars] What are the […]

Read more →