Main Challenges of Implementing IoT Security Standards
· Cybersecurity

Main Challenges of Implementing IoT Security Standards

IoT, as we know it today, allows us to make our lives easier — but it is not 100% secure. It can be hard to understand why it’s so difficult to come up with a comprehensive cybersecurity standard for IoT. After all, if we can create this technology, we should be able to keep it […]

Read more →
Embracing DevSecOps with Automated Software Binary Security
· Cybersecurity

Embracing DevSecOps with Automated Software Binary Security

DevOps came about with the understanding that software development and information technology operations work together to improve deployment frequency, while maintaining service stability. In this process, security was not often part of an original build, but rather “bolted on” afterwards. The new (and better) thinking is DevSecOps, which removes security from its silo and incorporates […]

Read more →
MQTT and CoAP: Security and Privacy Issues in IoT and IIoT Communication Protocols
· Cybersecurity

MQTT and CoAP: Security and Privacy Issues in IoT and IIoT Communication Protocols

Machine-to-machine (M2M) communication protocols, which enable machines to “talk” with one another so that commands are communicated and data is transmitted, are indispensable to applications and systems that make use of the internet of things (IoT) and the industrial internet of things (IIoT).Message Queuing Telemetry Transport (MQTT) is a communication protocol widely used in both IoT and IIoT deployments. […]

Read more →
IoT Security: The Visibility of Assets in the Field
· Cybersecurity

IoT Security: The Visibility of Assets in the Field

IoT security is a complex issue, especially in projects involving hundreds of edge devices in the field. Cloud security and edge security are two very different issues. Edge systems are isolated, and if there is a network disruption the devices need to know how to protect themselves on an individual basis. At Litmus we’ve seen three […]

Read more →
Two sides of IT vs. OT Security and ICS Security Operations
· Cybersecurity

Two sides of IT vs. OT Security and ICS Security Operations

People, Process, & Technology on Two sides of the Same Coin Who should perform the security of the operations technology (OT) and industrial control system (ICS) in any given company? This is a question I commonly get, which is based on a need to identify the proper structure, governance, staffing, tooling, training, etc., of personnel […]

Read more →
Impact to large-scale implementations: Smart factories and smart cities
· Cybersecurity

Impact to large-scale implementations: Smart factories and smart cities

In this article we discuss how insecure deployments and the lack of well-defined security in M2M technology can be abused to turn into unforeseen problems in critical and large-scale environments like smart factories and cities.M2M technology forms the core of IIoT systems for maintaining smart factories and building smart cities. As more of these connected […]

Read more →
The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking
· Cybersecurity

The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking

12 million trucks, or about 5% of vehicles on U.S. roads, are aggregated into fleets for government or commercial use. About 42% of these are connected with telematics Fleet Management System (FMS) for efficiency and compliance with government Electronic Logging Data (ELD) requirements. Typical FMS data captured includes miles driven, time of day, Global Positioning System […]

Read more →
Cultivating Security in the Food Production Industry
· Cybersecurity

Cultivating Security in the Food Production Industry

In the food production industry, high-tech tools and systems are being used to optimize production conditions. But new technology brings new challenges and risks. The world population is expected to reach 9.8 billion in 2050, according to a study published in 2017 by the United Nations Department of Economic and Social Affairs. The same study also shows […]

Read more →
Our Picks from Hannover Messe 2019 – Day 1. What’s next on our agenda?
· Connected Industry

Our Picks from Hannover Messe 2019 – Day 1. What’s next on our agenda?

It seems that 2019 is truly the year for Digital Transformation, as almost all of the announcements/sessions we heard today were about Industrial IoT and Industrial cybersecurity. We might be biased as our focus is 100% on IIoT. Here is what we found out today at Hannover Messe: The purpose of Azure Security Center for […]

Read more →
A new partnership for ICS Cybersecurity and security of Smart Cities
· Cybersecurity

A new partnership for ICS Cybersecurity and security of Smart Cities

The IoT Security Institute (IoTSI) announced this week that it has established a collaborative partnership with MEASC and Quill Security Technology. “This partnership acknowledges the increasing importance of a “time to act” approach to cybersecurity in smart cities and critical infrastructure design, operation and ongoing compliance services. Smart Cities are a must have in a smart digital age. They make […]

Read more →