Embedded devices need basic security measures like multi-factor authentication and unique credentials to reduce vulnerabilities and protect against cyber threats. Mauritz Botha, co-founder and CTO of XiO Inc., explains that cloud-based SCADA can update old…
Error Code Posts
As industrial enterprises lurch toward digital transformation and Industry 4.0, a new report looks at the security OT systems and finds it wanting. Grant Geyer, the Chief Strategy Officer for Claroty, talks about the findings…
I recently rode in a Waymo, Google’s self-driving taxi service, and it was fantastic. What if we took that vehicle off the safe roads of California, and put it in a warzone like Ukraine? If…
Imagine your best worst day during a cyber attack. Can you switch to manual systems in case of a failure? Has your team practiced for that? Dave Gunter, OT Cybersecurity Director at Armexa, discusses how…
This is the story of how the security of OT devices in the field can be modernized virtual isolation in the cloud, adding both authentication and encryption into the mix. Bill Moore, founder and CEO…
This is the story of the secret life of cellular chips and why we need to mitigate against the unintended access they provide. Deral Heiland, Principal Security Research for IoT at Rapid 7, describes a…
When we think of IoT, we first think of our smart light bulbs, our smart TVs, our smart baby monitors. However, we don’t typically associate IoT with high-performance race cars, and yet they collect terabytes…
What would happen if your GPS signal were jammed? It would impact more than just navigation – you’d also lose access to financial data and power. Joe Marshall, Senior IoT Strategist and Threat Researcher at…
Cybercriminal tactics against ICS include direct threats against individuals for MFA credentials, sometimes escalating to violence if they won’t share. Jim Coyle, US Public Sector CTO for Lookout, warns about the increasing use of hacking…