Cybersecurity best practices to implement highly secured devices

If an internet-connected device performs a non-critical function, why does it need to be highly secured? Because any device can be the target of a hacker, and any hacked device can be weaponized.
The post Cybersecurity best practices to implement highly secured devices appeared first on Microsoft Security. READ MORE HERE…

Read more

Managing risk in today’s IoT landscape: not a one-and-done

Connectivity empowers organizations to unlock the full potential of IoT—but it also introduces new cybersecurity attack vectors. What does it take to manage those risks?
The post Managing risk in today’s IoT landscape: not a one-and-done appeared first on Microsoft Security. READ MORE HERE…

Read more

Defending the power grid against supply chain attacks—Part 2: Securing hardware and software

The hardware and software companies who supply utilities must implement better security of their build and update environment to reduce the risk of an attack on critical infrastructure.
The post Defending the power grid against supply chain attacks—Part 2: Securing hardware and software appeared first on Microsoft Security. READ MORE HERE…

Read more

Defending the power grid against supply chain attacks—Part 1: The risk defined

The “Defending the power grid against supply chain attacks” blog series analyzes how supply chain attacks are conducted and the steps utilities, device manufacturers, and software providers can take to better secure critical infrastructure.
The post Defending the power grid against supply chain attacks—Part 1: The risk defined appeared first on Microsoft Security. READ MORE HERE…

Read more

Are IoT Threats Discussed In The Cybercriminal Underground?

With IoT devices expected to reach tens of billions in the next few years, is it any wonder that cybercriminals are looking for ways to take advantage of this massive attack surface to generate illicit money? A number of Trend Micro researchers from around the globe decided to look into this and launched a research…
The post Are IoT Threats Discussed In The Cybercriminal Underground? appeared first on . Read More HERE…

Read more

Movie Tech Review: Child’s Play 2019

A while back, Rik & Kasia Ferguson shared their thoughts on the movie, “Unfriended: The Dark Web.” The dark web and technology in general plays a pivotal role in the movie’s plot, so the team decided it would be interesting to have a real-world expert review. Everyone had a lot of fun, and thus Trend…
The post Movie Tech Review: Child’s Play 2019 appeared first on . Read More HERE…

Read more

Cybersecurity Leaders Are Talking A Lot About Counterfeit Devices

Malice Vs Greed Most discussion about security in the supply chain has been focused on detecting tampering, or preventing backdoors or sneaky things being inserted into components and software. There’s another aspect emerging and will dwarf the tampering: devices that are counterfeited for profit indirectly causing security problems. Counterfeit devices are ones that either by…
The post Cybersecurity Leaders Are Talking A Lot About Counterfeit Devices appeared first on . Read More HERE…

Read more

What Did We Learn from the Global GPS Collapse?

On April 6, 2019, a ten-bit counter rolled over. The counter, a component of many older satellites, marks the weeks since Jan 1, 1980. It rolled over once before, in the fall of 1999. That event was inconsequential because few complex systems relied on GPS. Now, more systems rely on accurate time and position data:…
The post What Did We Learn from the Global GPS Collapse? appeared first on . Read More HERE…

Read more

This Week in Security News: Cybersecurity Skills Gap and Legislature

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how the cybersecurity skills gap is affecting organizations. Also, learn how a bipartisan bill is working to close the gap. Read on: What Hacker History Can…
The post This Week in Security News: Cybersecurity Skills Gap and Legislature appeared first on . Read More HERE…

Read more