Announcing the general availability of Azure Defender for IoT

As businesses increasingly rely on connected devices to optimize their operations, the number of IoT and Operational Technology (OT) endpoints is growing dramatically—industry analysts have estimated that CISOs will soon be responsible for an attack surface multiple times larger than just a few years ago. Today we are announcing that Azure Defender for IoT is…
The post Announcing the general availability of Azure Defender for IoT appeared first on Microsoft Security. READ MORE HERE…

Read more

Go inside the new Azure Defender for IoT including CyberX

In 2020, the move toward digital transformation and Industry 4.0 took on new urgency with manufacturing and other critical infrastructure sectors under pressure to increase operational efficiency and reduce costs. But the cybersecurity model for operational technology (OT) was already shown to be lacking before the pandemic. A series of major cyberattacks across industries served…
The post Go inside the new Azure Defender for IoT including CyberX appeared first on Microsoft Security. READ MORE HERE…

Read more

Addressing cybersecurity risk in industrial IoT and OT

As the industrial Internet of Things (IIoT) and operational technology (OT) continue to evolve and grow, so too, do the responsibilities of the Chief Information Security Officer (CISO). The CISO now needs to mitigate risks from cloud-connected machinery, warehouse systems, and smart devices scattered among hundreds of workstations. Managing those security risks includes the need…
The post Addressing cybersecurity risk in industrial IoT and OT appeared first on Microsoft Security. READ MORE HERE…

Read more

Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them

Every year billions of new connected devices come online. These devices enable businesses to finetune operations, optimize processes, and develop analytics-based services.
The post Afternoon Cyber Tea: Cybersecurity & IoT: New risks and how to minimize them appeared first on Microsoft Security. READ MORE HERE…

Read more

Managing cybersecurity like a business risks: Part 1—Modeling opportunities and threats

We often talk about risks only in term.s of potential loss, but most risks have the potential for gain too. To manage cybersecurity as a business risk, we need to better understand the opportunities and risks of key business drivers
The post Managing cybersecurity like a business risks: Part 1—Modeling opportunities and threats appeared first on Microsoft Security. READ MORE HERE…

Read more

Cybersecurity best practices to implement highly secured devices

If an internet-connected device performs a non-critical function, why does it need to be highly secured? Because any device can be the target of a hacker, and any hacked device can be weaponized.
The post Cybersecurity best practices to implement highly secured devices appeared first on Microsoft Security. READ MORE HERE…

Read more

Managing risk in today’s IoT landscape: not a one-and-done

Connectivity empowers organizations to unlock the full potential of IoT—but it also introduces new cybersecurity attack vectors. What does it take to manage those risks?
The post Managing risk in today’s IoT landscape: not a one-and-done appeared first on Microsoft Security. READ MORE HERE…

Read more