Four most hard to solve IIoT security issues
· Cybersecurity

Four most hard to solve IIoT security issues

According to a forecast by Gartner, the number of IoT devices in use will reach 8.4 billion in 2017 and grow to a staggering 20.4 billion by 2020, and the market opportunity for IoT will reach US$2 trillion by 2017. With the proliferation of IoT devices and technologies in the commercial and industrial sectors, we […]

Read more →
6 Tips to Protect Your Network From Malware Attacks
· Cybersecurity

6 Tips to Protect Your Network From Malware Attacks

Malware attacks exploiting unprotected businesses can go undetected for months. Discover six ways in which you can future proof your network and protect from malware attacks. “There’s a concerning trend in these supply-chain attacks,” says Craig Williams, the head of Cisco’s Talos team. “Attackers are realizing that if they find these soft targets, companies without […]

Read more →
[Whitepaper] Integrating Security Into the IoT Strategy in the New Converged Environment
· Cybersecurity

[Whitepaper] Integrating Security Into the IoT Strategy in the New Converged Environment

Consumers want their work, home and mobile devices to communicate together to provide information that was previously not available from isolated systems. This desire is at the root of the Internet of Things (IoT). The rise of IoT started when consumers began to interconnect devices — ranging from personal computers, smartphones, tablets and wearables, to […]

Read more →
Size and complexity are the enemies of cybersecurity
· Cybersecurity

Size and complexity are the enemies of cybersecurity

In cybersecurity we are always faced with the chance that our system harbors some, unknown vulnerability, and the possibility that vulnerability will be discovered by some malicious actor who will then use it against our system, as well as other, similar systems. Cybersecurity vulnerabilities are the result of two kinds of errors or defects:design errors […]

Read more →
Why Don’t More Cars Update Their Software Automatically?
· Connected Industry

Why Don’t More Cars Update Their Software Automatically?

Tesla is the only major automaker that offers over the air (OTA) updates of both car software and firmware. This allows Tesla to add new features like new voice commands, driver profiles or blind spot warnings that weren’t available when the car was purchased. It also allows them to fix bugs that were either causing […]

Read more →
IoT Devices – with greater connectivity comes greater vulnerabilities
· Cybersecurity

IoT Devices – with greater connectivity comes greater vulnerabilities

The Internet of Things (IoT) represents an exciting period of innovation in our lives. It describes a world of devices all connected to the internet, a world in which inanimate technology that we use and see every day is becoming smarter. It also predicts a continuous journey towards greater ease and convenience, a future in […]

Read more →
Industrial Espionage is a major threat to the Manufacturing Sector
· Cybersecurity

Industrial Espionage is a major threat to the Manufacturing Sector

Industrial espionage is nothing new. Theft of trade secrets and corporate intellectual property (IP) such as proprietary manufacturing processes, formulas, recipes, and product designs has been happening for decades. And you probably already know this if you work in industries such as manufacturing, pharmaceuticals, and chemicals. What is industrial espionage? Industrial espionage is sometimes credited […]

Read more →
Stop Downplaying Threats to Critical Infrastructure
· Cybersecurity

Stop Downplaying Threats to Critical Infrastructure

It has been an incredibly busy three months in the world of Industrial Control Systems/Critical Infrastructure cybersecurity. A drop in the bucket for what we’ve become used to in the world of IT security – but incredibly noisy for this space – and an alarming precursor for what will come. Yes, we chose “will” come […]

Read more →
Industrial Robots Gone Rogue: Staying Ahead of Robot Cybersecurity Vulnerabilities
· Artificial Intelligence & ML

Industrial Robots Gone Rogue: Staying Ahead of Robot Cybersecurity Vulnerabilities

If you’re following industrial cyber security trends you know that industrial networks, endpoints and control systems typically have inherent weaknesses that make them insecure and vulnerable to compromise through digital methods. With 5.6 million newly connected devices added per day in 2016 and an estimated 21 billion online by 2020, these current growth trends only […]

Read more →
CEO Insights: Top cybersecurity challenges in the healthcare industry
· CEO Insights

CEO Insights: Top cybersecurity challenges in the healthcare industry

Cybersecurity is a big concern for the healthcare industry executives. Some healthcare organizations learned that the cost of a major cyber incident can include not only financial loss, but significant disruption to operations and reputational harm.  Ofer Amitai, CEO & Co-Founder at Portnox, answers to our Managing Editor’s questions about the biggest cybersecurity challenges in the […]

Read more →
Industrial Cyber Security: Why IT & OT collaboration is no longer an option but a necessity
· Cybersecurity

Industrial Cyber Security: Why IT & OT collaboration is no longer an option but a necessity

Since the mid-1990s, many industrial companies have interconnected their industrial control systems (ICSs) to improve productivity, maintenance, and safety in the operational environment. Some of this interconnectivity was to  the Internet.  While, this connectivity helped to improved the efficiency, security was at best a minimal consideration. The lack of adequate security planning has resulted in […]

Read more →
Thoughts on the on-going global cyber attacks as they affect ICSs
· Cybersecurity

Thoughts on the on-going global cyber attacks as they affect ICSs

For many years, there have been warnings about the cyber vulnerability of multiple infrastructures world-wide. Yet, those warnings are still not being adequately addressed.  In 2004, the Idaho National Laboratory (INL) provided a glimpse of what we’re seeing today with CrashOverride, etc. As a demonstration for the 2004 ICS Cyber Security Conference, the white hat […]

Read more →