One of Deutschland’s Iconic Businesses Addresses the Issue of Trust, Directly
· Cybersecurity

One of Deutschland’s Iconic Businesses Addresses the Issue of Trust, Directly

What does it mean to trust someone or something?  To my way of thinking, trust is having confidence that a person or organization will take actions that ensure my safety while aligning with my beliefs, expectations, and ideals.  In days past, perhaps it was more straight-forward.  A ride on the railroad required faith that the […]

Read more →
IoT Security – Game of Trust
· Cybersecurity

IoT Security – Game of Trust

When it comes to prominent technologies that are certain to rule the world and our everyday lives in the future, IoT is one of those that have a profound impact. We use this technology daily, and there are now more connected devices than there are people in the world. However, there’s more to IoT than smart home […]

Read more →
Machine-to-Machine (M2M) Technology Design Issues and Implementation Vulnerabilities
· Cybersecurity

Machine-to-Machine (M2M) Technology Design Issues and Implementation Vulnerabilities

In our latest research paper, titled “The Fragility of Industrial IoT’s Data Backbone: Security and Privacy Issues in MQTT and CoAP Protocols” and written with Rainer Vosseler and Davide Quarta, we discussed how MQTT and CoAP are affected by design issues and implementation vulnerabilities that can allow attackers to subvert devices enabled by these two […]

Read more →
Insiders – the biggest security threat to their organizations
· Cybersecurity

Insiders – the biggest security threat to their organizations

It was only a matter of time before what befell the Information Technology (IT) community was going to affect the Operational Technology (OT) community. Today, the OT C-suite is saddled with agenda items keeping them up at night. It is the constant and unrelenting security threat that at any moment can land the organization on […]

Read more →
Three Days of Insight into the Rebirth of Michigan – Cybersecurity
· Cybersecurity

Three Days of Insight into the Rebirth of Michigan – Cybersecurity

Day One As a proud graduate of The Ohio State University, when I think of Michigan, several things come to mind…but tossing aside for a moment the rivalries of one’s sports-related youth, the images that surface for me tend to be namesakes of a winged variety:  The Falcon, The Road Runner, The Firebird.  Yes, the […]

Read more →
A better security for critical infrastructure using strong authentication
· Cybersecurity

A better security for critical infrastructure using strong authentication

November is National Critical Infrastructure Security and Resilience Month so I thought it would be a great opportunity to discuss some of the security challenges concerning critical infrastructure, specifically the weak access controls in sensitive operational technology (OT) environments. Strong authentication is an essential requirement for critical infrastructure When defending critical infrastructure, it’s necessary to […]

Read more →
All Endpoints Are Not Created Equal, But They All Need Protection
· Cybersecurity

All Endpoints Are Not Created Equal, But They All Need Protection

What you are about to read could be straight out of a horror movie. You would hear the eerie voiceover intoning…”In a world where endpoints are under constant attack, how do you protect yourself? Your critical infrastructure? Your data? Your business?” It’s a weighty question and a huge topic that probably does warrant an entire […]

Read more →
Released this week: Global ICS & IIoT Risk Report
· Cybersecurity

Released this week: Global ICS & IIoT Risk Report

Industrial and critical infrastructure organizations that rely on industrial control systems (ICS) to run their businesses — such as firms in energy and utilities, oil & gas, pharmaceutical and chemical production, food & beverage, and other manufacturing sectors — have known their valuable assets are susceptible to cyberattack since Stuxnet was discovered and publicized in […]

Read more →
Critical Infrastructure and ICS Security Remain a Network Segmentation Problem
· Cybersecurity

Critical Infrastructure and ICS Security Remain a Network Segmentation Problem

Companies in every industry are developing and implementing connected industrial control applications as strategic digital business initiatives. However, the risks of security breaches and the subsequent impacts to consumer privacy and now personal safety are limiting the delivery of secure and resilient services, that are based on these connected applications.  Many company’s networks remain disconnected […]

Read more →
Staying secure in the smart era: Three rules for cybersecurity
· Cybersecurity

Staying secure in the smart era: Three rules for cybersecurity

Almost half of the manufacturers have fallen victim to cybercrime, according to the Cyber Security Manufacturing Report 2018, published by EEF. One of the biggest challenges for manufacturers is choosing from the range of products and services available to protect against these crimes. Here, I’ll explain three cybersecurity rules that manufacturers should abide by when […]

Read more →
US Cities Exposed: Industries and ICS security
· Cybersecurity

US Cities Exposed: Industries and ICS security

Today, 54% of the world’s population lives in urban areas, a proportion that is expected to increase to 66% by 2050. [2] According to the 2010 US Census, that number is even higher in the US, with 81% of the country’s population living in urban areas. [3] The largest metropolitan statistical areas in the US […]

Read more →