Three Days of Insight into the Rebirth of Michigan – Cybersecurity
· Cybersecurity

Three Days of Insight into the Rebirth of Michigan – Cybersecurity

Day One As a proud graduate of The Ohio State University, when I think of Michigan, several things come to mind…but tossing aside for a moment the rivalries of one’s sports-related youth, the images that surface for me tend to be namesakes of a winged variety:  The Falcon, The Road Runner, The Firebird.  Yes, the […]

Read more →
A better security for critical infrastructure using strong authentication
· Cybersecurity

A better security for critical infrastructure using strong authentication

November is National Critical Infrastructure Security and Resilience Month so I thought it would be a great opportunity to discuss some of the security challenges concerning critical infrastructure, specifically the weak access controls in sensitive operational technology (OT) environments. Strong authentication is an essential requirement for critical infrastructure When defending critical infrastructure, it’s necessary to […]

Read more →
All Endpoints Are Not Created Equal, But They All Need Protection
· Cybersecurity

All Endpoints Are Not Created Equal, But They All Need Protection

What you are about to read could be straight out of a horror movie. You would hear the eerie voiceover intoning…”In a world where endpoints are under constant attack, how do you protect yourself? Your critical infrastructure? Your data? Your business?” It’s a weighty question and a huge topic that probably does warrant an entire […]

Read more →
[Report] Exposed and Vulnerable Critical Infrastructure: Water and Energy Industries
· Cybersecurity

[Report] Exposed and Vulnerable Critical Infrastructure: Water and Energy Industries

TrendMicro published research at the end of October revealing how exposed human-machine interface (HMI) systems in thousands of critical water and energy organizations around the world could be exploited, causing significant real-world impacts, such as contaminating the water supply. A vast majority of the identified exposed systems are from smaller energy and water organizations that […]

Read more →
Critical Infrastructure and ICS Security Remain a Network Segmentation Problem
· Cybersecurity

Critical Infrastructure and ICS Security Remain a Network Segmentation Problem

Companies in every industry are developing and implementing connected industrial control applications as strategic digital business initiatives. However, the risks of security breaches and the subsequent impacts to consumer privacy and now personal safety are limiting the delivery of secure and resilient services, that are based on these connected applications.  Many company’s networks remain disconnected […]

Read more →
Staying secure in the smart era: Three rules for cybersecurity
· Cybersecurity

Staying secure in the smart era: Three rules for cybersecurity

Almost half of the manufacturers have fallen victim to cybercrime, according to the Cyber Security Manufacturing Report 2018, published by EEF. One of the biggest challenges for manufacturers is choosing from the range of products and services available to protect against these crimes. Here, I’ll explain three cybersecurity rules that manufacturers should abide by when […]

Read more →
Protect Critical Infrastructure With Runsafe Security’s Alkemist
· Cybersecurity

Protect Critical Infrastructure With Runsafe Security’s Alkemist

Hackers are having increasing success penetrating the operating technology and industrial control systems underpinning data centers, utilities, manufacturing plants. As organizations incorporate smart devices, connect to the Internet of Things, and utilize the cloud to optimize performance, new attack vectors – and cyber vulnerabilities – are created. Skilled cybercriminals only need to find a single […]

Read more →
A High Assurance Approach to Securing Network Infrastructure
· Cybersecurity

A High Assurance Approach to Securing Network Infrastructure

The inconvenient truth is that our current cybersecurity tools and methods are not a match for today’s sophisticated attackers who will target any exposed surface looking for vulnerabilities. Attackers need to only succeed once, while defenders must successfully protect their systems every time against all possible threats. Even the most security-conscious organizations aren’t immune to […]

Read more →
Commercial Availability of Self-Service Cyberhardening Technology
· Cybersecurity

Commercial Availability of Self-Service Cyberhardening Technology

RunSafe Security, the pioneer of a patented cyberhardening process for vulnerable embedded systems, devices and industrial control systems (ICS), has announced the commercial availability of Alkemist, a proprietary self-service technology built to reduce vulnerabilities and deny malware the uniformity needed to execute. Previously known as Software Guardian, Alkemist uses remotely deployable software binary runtime application self-protection […]

Read more →
US Intelligence says Cyber Threat Warning Lights are Blinking Red
· Cybersecurity

US Intelligence says Cyber Threat Warning Lights are Blinking Red

Why Industrial Operations are not Immune Recently, US intelligence chief Dan Coats remarked in a talk at the Hudson Institute that ‘the warning lights are blinking red again’ on cyber attacks, as they were before the Sept 11 attacks in 2001. While Coats addressed most of his comments to the country’s digital infrastructure, he mentioned […]

Read more →
How Adaptive Cyber Security Can Enable Digital Health Adoption
· Smart Cities, Buildings & Infrastructure

How Adaptive Cyber Security Can Enable Digital Health Adoption

Digital health focuses on connecting the systems, tools, medical devices, and services together that deliver needed healthcare to each of us and gives critical data insights to each player across the healthcare delivery landscape that weren’t available before.  According to the recent 8th Annual Industry Pulse Report from Change Healthcare, security and privacy concerns are […]

Read more →
The Antidote to Industrial IoT’s Kryptonite
· Cybersecurity

The Antidote to Industrial IoT’s Kryptonite

Today’s industrial infrastructure is stronger and smarter than ever before. As manufacturers seek greater scalability and efficiency, they’ve automated and digitized their machines to achieve unprecedented power. But these “super” machines have a critical weakness – they were not built to shield against today’s advanced cyberattacks. One single attack – industrial IoT ’s kryptonite – […]

Read more →