How Adaptive Cyber Security Can Enable Digital Health Adoption
· Smart Cities, Buildings & Infrastructure

How Adaptive Cyber Security Can Enable Digital Health Adoption

Digital health focuses on connecting the systems, tools, medical devices, and services together that deliver needed healthcare to each of us and gives critical data insights to each player across the healthcare delivery landscape that weren’t available before.  According to the recent 8th Annual Industry Pulse Report from Change Healthcare, security and privacy concerns are […]

Read more →
Binary randomization makes large-scale vulnerability exploitation nearly impossible
· Cybersecurity

Binary randomization makes large-scale vulnerability exploitation nearly impossible

One of the main reasons cyber risk continues to increase exponentially is due to the rapid expansion of attack surfaces – the places where software programs are vulnerable to attack or probe by an adversary. Attack surfaces, according to the SANS Institute, can include any part of a company’s infrastructure that exposes its networks and systems […]

Read more →
The Overwhelming World of Smart Cities and Cyber-Kinetic Threats
· Smart Cities

The Overwhelming World of Smart Cities and Cyber-Kinetic Threats

For most people around the world, cities are central to our lives and security. More than half of the world’s population lives in urban areas and that percentage is expected to grow dramatically over the coming decades. Along with this influx into cities, though, come many challenges. Increases in energy consumption strain remaining resources. Increasing […]

Read more →
The Antidote to Industrial IoT’s Kryptonite
· Cybersecurity

The Antidote to Industrial IoT’s Kryptonite

Today’s industrial infrastructure is stronger and smarter than ever before. As manufacturers seek greater scalability and efficiency, they’ve automated and digitized their machines to achieve unprecedented power. But these “super” machines have a critical weakness – they were not built to shield against today’s advanced cyberattacks. One single attack – industrial IoT ’s kryptonite – […]

Read more →
Blockchain: The Missing Link Between Security and the IoT?
· Cybersecurity

Blockchain: The Missing Link Between Security and the IoT?

The internet of things (IoT) has been associated with major cyberattacks, often involving the abuse of vulnerable connected devices, such as surveillance cameras, to facilitate malicious activities. Of course, concerns have been raised about the IoT’s capability to secure billions of devices connected to the unwieldy internet, calling for viable solutions that could fill the […]

Read more →
Security is a shared responsibility between the end user and the cloud provider
· Cybersecurity

Security is a shared responsibility between the end user and the cloud provider

As the security of your data is the most important factor when considering the use of cloud services, we will examine how data is protected at the client site, as it traverses public and private networks, and within the cloud provider’s data centers. Security is a shared responsibility between the end user and the cloud provider […]

Read more →
Cybersecurity Threats – The New Reality for Utilities
· Cybersecurity

Cybersecurity Threats – The New Reality for Utilities

Cybersecurity experts agree: Cyberattacks are the new reality for utility companies. On Jan. 10th, 2018, a major power outage hits the Consumer Electronics Show (CES), Las Vegas. For nearly two hours, participants were reminded that without electricity, the digital economy would not survive very well. In 2016, 3.85 trillion kilowatthours (kWh) [EIA] was consumed in the […]

Read more →
Digital Health’s cybersecurity imperative
· Cybersecurity

Digital Health’s cybersecurity imperative

If you haven’t already heard, the age of digital health is upon us. And for healthcare providers, patients and consumers, it’s about time. What is digital health? Digital health, sometimes referred to as eHealth or Mobile Health, refers to the many elements that are included in the digital healthcare programs, like health technologies, healthcare, living […]

Read more →
The importance of the intent-based security in smart manufacturing
· Cybersecurity

The importance of the intent-based security in smart manufacturing

Industrie 4.0, offers great promise for manufacturers to optimize business operations. The key to any successful Industrial IoT project lies in the factory data. Industrial customers need seamless, secure access to this data to make better business decisions in their plants, which can only happen with a reliable plant to enterprise network and unique software […]

Read more →
Why food & beverage companies should crack down on Cyber threats to ICS
· Cybersecurity

Why food & beverage companies should crack down on Cyber threats to ICS

When we buy groceries at the supermarket, most of us check the ingredients and expiration dates of packaged goods. But how can we be sure that the products we bring home are safe to eat and drink? Naturally, food and beverage (F&B) manufacturers have a vested interest in ensuring the quality and safety of their […]

Read more →
RSA Conference in Review – “Securing What Matters”
· Cybersecurity

RSA Conference in Review – “Securing What Matters”

Coming off of San Francisco’s RSA Conference, the best way to describe the event is “sensory overload.” An estimated 45,000 technology and cybersecurity professionals descended upon Moscone Center – but the crowds overflowed into local bars, restaurants and hotels across South Market, Mission District, Nob Hill and the Financial District.  From IT giants to start-ups, […]

Read more →
The Importance of Security by Design for IoT Devices
· Cybersecurity

The Importance of Security by Design for IoT Devices

We’re on the verge of an explosion of IoT-related products and services and the security for IoT devices is a concern. We all know that the Internet of Things or IoT has started to disrupt consumers, enterprises and governments and is paving the way of an analytical revolution. From connected homes and self-driving cars, from […]

Read more →