Attack Vectors in the… Trillions?
The growing attack surface of the new Industry 4.0 internet is a big problem. On this everyone agrees. But underneath the headlines and the frequent “patch now” warnings from firewall vendors is a more ominous reality few are talking about: the
Top risks to organizations in current IIoT environment
The number of cyberattacks, data breaches and overall business disruption caused by unsecured IoT/IIoT devices are increasing because many companies don’t know the depth and breadth of the risk exposures they face when leveraging IoT devices and other emerging technologies. IoT
How would you secure over 10 million IIoT devices?
Industrial IoT (IIoT) devices will comprise the majority of the billions of IoT devices deployed over the next decade. How will the information security market meet this onslaught of technology? The consumer market is not a useful guide for this analysis.
Main Challenges of Implementing IoT Security Standards
IoT, as we know it today, allows us to make our lives easier — but it is not 100% secure. It can be hard to understand why it’s so difficult to come up with a comprehensive cybersecurity standard for IoT.
Shifting Tides in IIoT Security
I’ve been writing about OT cybersecurity for a while and, although a consistent part of the message is that the overall level of risk is high and rising, some positive developments should be acknowledged. In particular, the past couple of
Four most hard to solve IIoT security issues
According to a forecast by Gartner, the number of IoT devices in use will reach 8.4 billion in 2017 and grow to a staggering 20.4 billion by 2020, and the market opportunity for IoT will reach US$2 trillion by 2017.
[Whitepaper] Integrating Security Into the IoT Strategy in the New Converged Environment
Consumers want their work, home and mobile devices to communicate together to provide information that was previously not available from isolated systems. This desire is at the root of the Internet of Things (IoT). The rise of IoT started when
Protecting IIoT with a New Approach to Cyber Defense
Measure, monitor and monetize has long been a mantra for any industry or corporation that wants to be successful with its products or services. This capability is finally ubiquitous thanks to technology being powerful enough and cost effective enough to measure