Could a personal medical device be a threat for an organization? Turns out it’s similar to protecting against an attack on a mobile device.Except a denial of service could prove fatal. Todd Brasel, the author…
Error Code Posts
Josh Corman, VP of Cyber Safety Strategy at Claroty, is a hacker who knows public policy well. Ten years ago he created the volunteer organization I Am The Cavalry to help educate sitting legislators on…
This is the story about researchers who monitor the threats against Iot and OT systems, and the steps being taken to mitigate them. Ishmael Valenzuela, Vice President of the threat research and Intelligence Team at…
There’s a lot of FUD around hacking the power grid. Most often, there’s a more common cause: Soot. Even Squirrels. Jori Van Antwerp, CEO of SynSaber. talks about the realities of the US power grid…
How the rapid proliferation of EV charging stations is already leading to attacks on the stations and the vehicles themselves, and what we should do about it. Charles Egan, CTO of Blackberry, talks about the…
The Biden-Harris 2023 National Cybersecurity Strategy breaks with Cold War thinking and offers a bold new approach to today’s online offense and defense. Danielle Jablanski from Nozomi Networks breaks down the ambitious new policy which…
We’ve already seen botnets composed of compromised devices like routers and security cameras. So how do we secure them and our smart lightbulbs too? Window Snyder, CEO of Thistle Technologies, explains how new devices can…
This is the story of Cris Thomas aka Space Rogue, who’s written perhaps the best book about the early days of hacking, Space Rogue: How the Hackers Known as the L0pht Changed The World. Unlike…
This is the story of Zhadnost, of how an IoT-based botnet was conscripted into an online war in the days immediately before the kinetic Ukraine invasion. Ryan Slaney of SecurityScorecard walks us through the timeline…