A future where the Internet of Things spreads exponentially is almost certain. Seemingly everybody wants these devices: consumers for the helpful features and manufacturers for the ability to collect data about the
Trend Micro warned organizations to revisit their operational technology (OT) security after finding major design flaws and vulnerable implementations related to two popular machine-to-machine (M2M) protocols, Message Queuing Telemetry Transport
The media headlines were about the end of austerity and the digital sales tax on Google and Amazon. Yet from the viewpoint of a technology innovator it was the Chancellor
John Toterhi, a security researcher with IoT security company Finite State, believes that many of the security problems plaguing IoT devices are solvable problems through transparency. Click here to view
Cybersecurity vendors and organizations put out a steady stream of research, sometimes in support of a product, but it almost always has something to say about the state of cyberthreats.
In December 2017, cyberattackers used TRITON/TRISIS malware to target safety instrumented system (SIS) controllers at a critical infrastructure organization. The malware was designed specifically to interact with the controllers, potentially
When we talk cybersecurity awareness, the focus is almost always on employees and their operations. While a security-minded staff is indispensable and always the first line of a company’s cybersecurity
Gone are the days when a masked robber would walk into a bank, wave a gun in the air and declare, “This is a stick up!” Why would any criminal