5G is Coming – IoT Security Remains an Unanswered Challenge
· Cybersecurity

5G is Coming – IoT Security Remains an Unanswered Challenge

Why IoTs have created a security crisis and strained the communications infrastructure along the way. Quick Hit Points:  Mobile phone markets are completely saturated, yet the IoT market, in its infancy, still outnumbers mobile phones 2:1 (16 billion vs. 8 billion devices) IoTs are purpose-built devices with a lifespan of 8 to 20 years and […]

Read more →
How to Regulate Cybersecurity of the Internet of Things
· Cybersecurity

How to Regulate Cybersecurity of the Internet of Things

I had the honor of speaking on IoT security policy at the annual CyberNextDC conference organized by the Cybersecurity Coalition.  As the number of connected devices grows and these devices are increasingly used to perpetrate “botnets”, global policymakers are under pressure to regulate the cybersecurity of the Internet of Things (IoT).  Below are just a […]

Read more →
Protecting Smart Buildings from Cyber Attacks
· Cybersecurity

Protecting Smart Buildings from Cyber Attacks

It was an attack on a hospital like no other, reported the news in February 2016. The Hollywood Presbyterian Medical Center had been hacked. Its services were crippled. As emergency patients were diverted to other area hospitals, hospital administrators received an ominous message. Pay a ransom to get your hospital systems back. The hospital ultimately […]

Read more →
Simple NIST cybersecurity Compliance for Manufacturing
· Cybersecurity

Simple NIST cybersecurity Compliance for Manufacturing

As industrial technology advances, manufacturers are increasingly using cloud, data analytics and mobile to improve their connectivity and infrastructure. This means a larger attack surface which creates a rich target for threats that cause physical damage, facility downtime, and breaches of customer data and intellectual property. To help manufacturing organizations reduce cybersecurity risk, NIST published […]

Read more →
How to Actively Secure Your Industrial Environment In the New Era of Distrust
· Cybersecurity

How to Actively Secure Your Industrial Environment In the New Era of Distrust

Today’s sophisticated Operations Technology (OT) environments have a large attack surface with numerous attack vectors. Without complete coverage, the likelihood of getting attacked is not a matter of ‘if’; it’s a matter of ‘when’. Security for OT has gained significant attention due to a confluence of events. Up until only recently the IT infrastructure played front […]

Read more →
Attack Vectors in the… Trillions?
· Cybersecurity

Attack Vectors in the… Trillions?

The growing attack surface of the new Industry 4.0 internet is a big problem. On this everyone agrees. But underneath the headlines and the frequent “patch now” warnings from firewall vendors is a more ominous reality few are talking about: the exponential vector problem. Yes, the attack surface is huge and growing. 127 new devices per second are […]

Read more →
Use a Zero Trust Approach to Protect Your Smart Cities Projects from Hackers
· Cybersecurity

Use a Zero Trust Approach to Protect Your Smart Cities Projects from Hackers

Smart cities projects continue to gain momentum, given the need to address our aging infrastructure while enhancing the quality of life for both residents and visitors. New Internet of Things (IoT) and next generation network technologies like 5G enable smart parking, better traffic and mass transit control, smart lighting systems, and crime prevention. At the […]

Read more →
The Digital Cybersecurity Paradox
· Cybersecurity

The Digital Cybersecurity Paradox

In 5 years there will be 75 billion devices connected to the internet, perhaps a few billion insecure and unpatchable. An estimated 2 billion run VxWorks and perhaps a couple hundred million of those will not be patched in any reasonable length of time. About 200 million Internet-connected devices—some that may be controlling elevators, medical […]

Read more →
In Security, Process is as Reliable as Luck
· Cybersecurity

In Security, Process is as Reliable as Luck

Lately, I have seen two common themes whenever IoT security is brought up; 1) complete acceptance that IoTs pose unique security challenges, and 2) how they have an IT/OT collaboration process to address them. Everybody knows what IT is, but as a reminder, OT, or operationalized technologies, are network/Internet-connected technologies whose primary function is not […]

Read more →
The Cybersecurity Implications of Infrastructure Modernization
· Cybersecurity

The Cybersecurity Implications of Infrastructure Modernization

The adoption of new technologies in oil and gas facilities is a dual-edged sword. On one side, there are the obvious benefits of implementing industrial internet of things (IIoT) devices to improve efficiencies and reduce operational costs. On the other side, there are inherent risks associated with upgrading systems and with the cybersecurity infrastructure. Cybersecurity […]

Read more →
Top risks to organizations in current IIoT environment
· Connected Industry

Top risks to organizations in current IIoT environment

The number of cyberattacks, data breaches and overall business disruption caused by unsecured IoT/IIoT devices are increasing because many companies don’t know the depth and breadth of the risk exposures they face when leveraging IoT devices and other emerging technologies. IoT and IIoT are a set of business and technology innovations that offers many compelling […]

Read more →
[New IIC white paper] Data Protection Best Practices
· Cybersecurity

[New IIC white paper] Data Protection Best Practices

Protecting sensitive data created, stored and consumed by sensor-driven Industrial Internet of Things (IIoT) technology and applications is one of the foundations of trustworthy IIoT systems. Broadly speaking, data protection measures resist internal and external disturbances and attacks on critical data and IIoT systems at large. These measures are applied over the entire lifecycle of […]

Read more →