Virtual Reality, Augmented Reality and Futuristic Threat Modeling

Augmented and virtual reality can be invaluable tools for threat modeling in all sectors, but the emerging technologies also introduce new vulnerabilities.

The post Virtual Reality, Augmented Reality and Futuristic Threat Modeling appeared first on Security Intelligence.

Continue reading Virtual Reality, Augmented Reality and Futuristic Threat Modeling

Insider Threats, Industrial Sabotage and Game Theory, Part 3: Multiplayer Games

Organizations seeking to prevent insider threats should establish red, blue and black teams to produce threat models for multiplayer games.

The post Insider Threats, Industrial Sabotage and Game Theory, Part 3: Multiplayer Games appeared first on Security Intelligence.

Continue reading Insider Threats, Industrial Sabotage and Game Theory, Part 3: Multiplayer Games

Insider Threats, Industrial Sabotage and Game Theory: Part 2

When it comes to securing industrial IT environments, the implications of game theory vary depending on whether the parties cooperate, collude or defect.

The post Insider Threats, Industrial Sabotage and Game Theory: Part 2 appeared first on Security Intelligence.

Continue reading Insider Threats, Industrial Sabotage and Game Theory: Part 2

Children’s Health Care, Patient Records and Black Market Identity Theft

Children’s hospitals often fall victim to black market identity theft because their primary goal is treating patients — data security is secondary.

The post Children’s Health Care, Patient Records and Black Market Identity Theft appeared first on Security Intelligence.

Continue reading Children’s Health Care, Patient Records and Black Market Identity Theft

Insider Threats, Industrial Sabotage and Game Theory

Insider threats can achieve industrial sabotage by slowly gaining control over individual projects, programs and then eventually the company.

The post Insider Threats, Industrial Sabotage and Game Theory appeared first on Security Intelligence.

Continue reading Insider Threats, Industrial Sabotage and Game Theory

The Multitude of Threat Vectors Vehicle Area Networks Create

The vehicle area networks used by autonomous vehicles will need to protected with the most sophisticated security measures available.

The post The Multitude of Threat Vectors Vehicle Area Networks Create appeared first on Security Intelligence.

Continue reading The Multitude of Threat Vectors Vehicle Area Networks Create

A Future Full of Drones — and the Advanced Threats They Present

Drones may be a relatively new technology, but there are a number of established risks and threats that need to be addressed by all organizations.

The post A Future Full of Drones — and the Advanced Threats They Present appeared first on Security Intelligence.

Continue reading A Future Full of Drones — and the Advanced Threats They Present