Top 5 Physical Security Considerations

With the rise of IoT technology across every aspect of business, security convergence is quickly becoming the new norm. In a world where just about everything is connected to the internet and to other devices, old strategies are becoming obsolete. Tre… Continue reading Top 5 Physical Security Considerations

How to Protect Medical Devices from Ransomware

Cyberattacks on hospitals are rising, and patients are worried. Is my personal data at risk? Could ransomware or hackers effectively shut down the ER near me?  Consider these findings from a March 2021 report by cybersecurity provider Morphisec:   Abo… Continue reading How to Protect Medical Devices from Ransomware

Ransomware in Auto Manufacturing Threatens Industry’s Recovery

As automotive supply chains become more complex, automotive manufacturers are increasingly susceptible to a ransomware attack, according to a report from Black Kite. The security firm’s researchers analyzed the cybersecurity posture and ransomware sus… Continue reading Ransomware in Auto Manufacturing Threatens Industry’s Recovery

Understanding Global IoT Security Regulations

The IoT is maturing rapidly, and surveys show that global IoT spending will achieve a combined annual growth rate (CAGR) of 11.3% over the 2020-2024 forecast period. It offers promising benefits that are rapidly transforming a variety of industries, i… Continue reading Understanding Global IoT Security Regulations

Did your WD My Book NAS get Wiped? Put a Brave Face on It

A 2019 vulnerability is being exploited to remotely wipe WD My Book Live NAS devices, by Eastern-European malefactors.
The post Did your WD My Book NAS get Wiped? Put a Brave Face on It appeared first on Security Boulevard.
Continue reading Did your WD My Book NAS get Wiped? Put a Brave Face on It

How to Dissect Unusual Protocols for Troubleshooting OT Security

To analyze the OT security risks of undocumented protocols, we need to understand how devices work, and how they communicate. Nozomi Networks Labs demonstrates how to use Lua APIs to instruct Wireshark to properly dissect an undocumented protocol.
The … Continue reading How to Dissect Unusual Protocols for Troubleshooting OT Security

How to Dissect Unusual Protocols for Troubleshooting OT Security

To analyze the OT security risks of undocumented protocols, we need to understand how devices work, and how they communicate. Nozomi Networks Labs demonstrates how to use Lua APIs to instruct Wireshark to properly dissect an undocumented protocol.
The … Continue reading How to Dissect Unusual Protocols for Troubleshooting OT Security

Voice-Activated Device Privacy: What You Need to Know

When it comes to evaluating technology in the home, there seems to be no shortage of new devices and shiny gadgets, mainly part of the Internet of Things (IoT), to discuss. Unfortunately, there seems to be no shortage of security issues to consider reg… Continue reading Voice-Activated Device Privacy: What You Need to Know

Critical Infrastructure is Missing Something Critical

The Colonial Pipeline attack was yet another reminder that critical infrastructure is in desperate need of stronger security. The attack is one of the most recent victims of cyberattacks on critical infrastructure; the phenomenon is not new, nor is it… Continue reading Critical Infrastructure is Missing Something Critical

Cybercriminals Increasingly Target Manufacturing, IP

Recent attacks targeting intellectual property (IP) and critical infrastructure are raising the security stakes for manufacturing organizations, as the industry records one of the highest attack rates of any sector since the onset of COVID-19. One in … Continue reading Cybercriminals Increasingly Target Manufacturing, IP