Cybersecurity and Data Concerns in 5G
For the advantages of 5G to be unlocked, ample preparation and planning are necessary. Looking at the changes 5G networks might bring about on an enterprise and its security is a good place to start. One of the first areas of
Protecting Smart Buildings from Cyber Attacks
It was an attack on a hospital like no other, reported the news in February 2016. The Hollywood Presbyterian Medical Center had been hacked. Its services were crippled. As emergency patients were diverted to other area hospitals, hospital administrators received
In Security, Process is as Reliable as Luck
Lately, I have seen two common themes whenever IoT security is brought up; 1) complete acceptance that IoTs pose unique security challenges, and 2) how they have an IT/OT collaboration process to address them. Everybody knows what IT is, but
[New IIC white paper] Data Protection Best Practices
Protecting sensitive data created, stored and consumed by sensor-driven Industrial Internet of Things (IIoT) technology and applications is one of the foundations of trustworthy IIoT systems. Broadly speaking, data protection measures resist internal and external disturbances and attacks on critical data
Main Challenges of Implementing IoT Security Standards
IoT, as we know it today, allows us to make our lives easier — but it is not 100% secure. It can be hard to understand why it’s so difficult to come up with a comprehensive cybersecurity standard for IoT.
IoT Security – Game of Trust
When it comes to prominent technologies that are certain to rule the world and our everyday lives in the future, IoT is one of those that have a profound impact. We use this technology daily, and there are now more connected
Two key capabilities in the advancement of IoT network security and cyber defense
Nowadays, cyber-attacks are automated but still under human direction and control, and therefore cyber defenses must also be automated to have any chance of protecting cyber and digital assets from both the automated attacks and the human element behind those
An overview of the IoT Security Market Report 2017-2022
This year was one of the most intense in terms of cybersecurity attacks affecting industrial control systems. For the first time since Stuxnet, a malicious toolset called CrashOverride/Industroyer targeted physical systems. The WannaCry and Petya attacks appear to have changed