IoT Security – Game of Trust
· Cybersecurity

IoT Security – Game of Trust

When it comes to prominent technologies that are certain to rule the world and our everyday lives in the future, IoT is one of those that have a profound impact. We use this technology daily, and there are now more connected devices than there are people in the world. However, there’s more to IoT than smart home […]

Read more →
A better security for critical infrastructure using strong authentication
· Cybersecurity

A better security for critical infrastructure using strong authentication

November is National Critical Infrastructure Security and Resilience Month so I thought it would be a great opportunity to discuss some of the security challenges concerning critical infrastructure, specifically the weak access controls in sensitive operational technology (OT) environments. Strong authentication is an essential requirement for critical infrastructure When defending critical infrastructure, it’s necessary to […]

Read more →
IIoT Security:  Obscure, Encrypt and Design Wisely
· Cybersecurity

IIoT Security: Obscure, Encrypt and Design Wisely

With data being the “new oil,” now more than ever it needs securing.  This is especially true when it is coming from the manufacturing floor and as part of the Industrial Internet of Things (IIoT). A single successful cyber attack on the IIoT can cripple critical services, civic infrastructure, agriculture or energy and put people’s safety at risk.   […]

Read more →
US Cities Exposed: Industries and ICS security
· Cybersecurity

US Cities Exposed: Industries and ICS security

Today, 54% of the world’s population lives in urban areas, a proportion that is expected to increase to 66% by 2050. [2] According to the 2010 US Census, that number is even higher in the US, with 81% of the country’s population living in urban areas. [3] The largest metropolitan statistical areas in the US […]

Read more →
Key differences between Node-RED and Crosser in Industrial IoT
· Connected Industry

Key differences between Node-RED and Crosser in Industrial IoT

Almost everyone that have tried to do some experiments with IoT projects have come across Node-RED, whether this was for a private hobby project or a business application. The reason is of course that Node-RED is a great tool, easy to get started with, large community support and free! At a first glance there are […]

Read more →
Smart Cities – Moving Toward Utopia with Security in Mind
· Smart Cities

Smart Cities – Moving Toward Utopia with Security in Mind

More than half (54%) of the world’s current population resides in urban areas compared with just 30% in the 1950s. In 2009, the global population was estimated at 6.8 billion —around 3.7 billion lived in urban areas. By 2050, 66% of all people will be urban dwellers. Urbanization does not always occur organically. To accelerate […]

Read more →
Automotive Security – A Security Assurance Framework for Automotive Industry
· Cybersecurity

Automotive Security – A Security Assurance Framework for Automotive Industry

With the inter-connectivity of devices becoming ever more present in our lives, it’s vital to bring security standards up to par. In the automotive industry, this can be especially difficult owing to its many unique properties that make the problems of automotive security unique to the industry. Considering how different automotive domain is from all […]

Read more →
Is Malware hiding in your ICS Network?
· Cybersecurity

Is Malware hiding in your ICS Network?

Most industrial organizations still consider their ICS networks to be safe from common cyber threats that mainly target IT networks. However, two recent cryptocurrency mining incidents demonstrate that  ICS networks are not “sterile” from unwanted software. Moreover, the fact that these cyber incidents took place at critical infrastructure facilities in Europe and Russia shatters the myth that […]

Read more →
Renewable resources can increase cyber threats
· Cybersecurity

Renewable resources can increase cyber threats

Renewable resources are good for the environment and reduce consumer costs but they are not a panacea to reducing electric grid cyber threats despite the prevailing view by many that renewable resources can reduce the cyber threat to electric utilities. I did a walkdown of several utility-scale solar facilities. Consider your roof-top solar system and […]

Read more →
How Do We Enhance Trust in Connected Things?
· Cybersecurity

How Do We Enhance Trust in Connected Things?

Is technology advancing and evolving faster than our collective mindset? It’s an interesting thought, and perhaps easy to confirm when you start considering connectivity. Today, we have the Internet of Things, and we enjoy the hyper-connectivity it provides if only we can get ourselves to trust it. Our security technology is lagging behind, so how […]

Read more →
The Antidote to Industrial IoT’s Kryptonite
· Cybersecurity

The Antidote to Industrial IoT’s Kryptonite

Today’s industrial infrastructure is stronger and smarter than ever before. As manufacturers seek greater scalability and efficiency, they’ve automated and digitized their machines to achieve unprecedented power. But these “super” machines have a critical weakness – they were not built to shield against today’s advanced cyberattacks. One single attack – industrial IoT ’s kryptonite – […]

Read more →
Blockchain: The Missing Link Between Security and the IoT?
· Cybersecurity

Blockchain: The Missing Link Between Security and the IoT?

The internet of things (IoT) has been associated with major cyberattacks, often involving the abuse of vulnerable connected devices, such as surveillance cameras, to facilitate malicious activities. Of course, concerns have been raised about the IoT’s capability to secure billions of devices connected to the unwieldy internet, calling for viable solutions that could fill the […]

Read more →