Week in review: Deploying automation securely, dark web activities that indicate a breach

Here’s an overview of some of last week’s most interesting news and articles: Industrial cybersecurity: Protecting OT from IT A powerful technique for protecting OT from IT, or to enforce whatever separation is required to ensure the integr… Continue reading Week in review: Deploying automation securely, dark web activities that indicate a breach

Week in review: Bluetooth flaw, ERP applications under attack, advancing security with machine learning

Here’s an overview of some of last week’s most interesting news and articles: SCADA vulnerabilities in ICS architectures A major challenge in industrial control system architecture involves the dual nature of its underlying technologies. Vu… Continue reading Week in review: Bluetooth flaw, ERP applications under attack, advancing security with machine learning

Week in review: The OT/ICS landscape for cyber professionals, putting the Sec into DevSecOps

Here’s an overview of some of last week’s most interesting news: How to allocate budget for a well-rounded cybersecurity portfolio What should a well-rounded cybersecurity portfolio look like? Android devices with pre-installed malware sold… Continue reading Week in review: The OT/ICS landscape for cyber professionals, putting the Sec into DevSecOps

Week in review: New LTE attacks, common API vulnerabilities, risk management trends

Here’s an overview of some of last week’s most interesting news: Four common API vulnerabilities and how to prevent them One of the main purposes of an API is to help developers get things done—and no one wants to work with a locked-down to… Continue reading Week in review: New LTE attacks, common API vulnerabilities, risk management trends

Week in review: Masking printers’ tracking dots, anti-privacy dark patterns, and WPA3

Here’s an overview of some of last week’s most interesting news and articles: How Facebook and Google nudge users to make anti-privacy choices Facebook, Google and Microsoft use design techniques and tricks to steer users toward sharing mor… Continue reading Week in review: Masking printers’ tracking dots, anti-privacy dark patterns, and WPA3

Week in review: Threat modeling, blockchain and security, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news and articles: Cisco plugs critical flaws in many switches, security appliances Cisco has released security updates to address a bucketload of vulnerabilities affecting multiple… Continue reading Week in review: Threat modeling, blockchain and security, new issue of (IN)SECURE