How smartphones became IoT’s best friend and worst enemy

These days, you’d be hard-pressed to find connected devices that do not come with companion smartphone applications. In fact, it’s very common for contemporary devices to offload most (if not all) of its display to the user handset. Smartphones and the… Continue reading How smartphones became IoT’s best friend and worst enemy

How Containers Support the IT-OT Convergence

The worlds of information technology (IT) and operational technology (OT) are colliding. In July 2019, Automation.com cited a survey finding where 82% of respondents told Forrester and Nozomi Networks that their organizations were in the early stages o… Continue reading How Containers Support the IT-OT Convergence

Critical infrastructure and industrial orgs can test Azure Defender for IoT for free

Azure Defender for IoT – Microsoft’s new security solution for discovering unmanaged IoT/OT assets and IoT/OT vulnerabilities – is now in public preview and can be put to the test free of charge. The solution can alert administrators … Continue reading Critical infrastructure and industrial orgs can test Azure Defender for IoT for free

Vulnerability Disclosure: Ethical Hackers Seek Best Practices

Cybersecurity researchers Brian Gorenc and Dustin Childs talk about the biggest vulnerability disclosure challenges in IoT and the industrial vertical. Continue reading Vulnerability Disclosure: Ethical Hackers Seek Best Practices

3 Areas of Your IT Infrastructure that SCM Can Help to Secure

Gone are the days when security teams could focus all of their efforts on keeping attackers out of the network. There’s no inside or outside anymore. The modern network is porous; it allows greater numbers and types of devices to connect to it from all… Continue reading 3 Areas of Your IT Infrastructure that SCM Can Help to Secure

Researchers find critical RCE vulnerabilities in industrial VPN solutions

Critical vulnerabilities in several industrial VPN implementations for remotely accessing operational technology (OT) networks could allow attackers to overwrite data, execute malicious code or commands, cause a DoS condition, and more. “Exploiti… Continue reading Researchers find critical RCE vulnerabilities in industrial VPN solutions

IoT and Vendors: How To Stay Safe

The internet of things, or IoT, is growing faster than a weed in the summertime. This catch-all name covers everything from your front door security cameras to factory floor control devices, often called the industrial internet of things (IIoT). As th… Continue reading IoT and Vendors: How To Stay Safe

Advanced attack scenarios and sabotage of smart manufacturing environments

Advanced hackers could leverage unconventional, new attack vectors to sabotage smart manufacturing environments, according to Trend Micro. Industry 4.0 Lab, the system that Trend Micro analyzed during this research “Past manufacturing cyber attacks hav… Continue reading Advanced attack scenarios and sabotage of smart manufacturing environments

Manufacturing Also Faces Remote Working Security Risks

Threats to the operational technology network in manufacturing facilities during remote work are high considerations in the time of COVID-19 When talking about security risks due to COVID-19, much of the discussion centers around displaced workers movi… Continue reading Manufacturing Also Faces Remote Working Security Risks