Defending the power grid against supply chain attacks—Part 1: The risk defined

The “Defending the power grid against supply chain attacks” blog series analyzes how supply chain attacks are conducted and the steps utilities, device manufacturers, and software providers can take to better secure critical infrastructure.
The post Defending the power grid against supply chain attacks—Part 1: The risk defined appeared first on Microsoft Security. READ MORE HERE…

Read more

Are IoT Threats Discussed In The Cybercriminal Underground?

With IoT devices expected to reach tens of billions in the next few years, is it any wonder that cybercriminals are looking for ways to take advantage of this massive attack surface to generate illicit money? A number of Trend Micro researchers from around the globe decided to look into this and launched a research…
The post Are IoT Threats Discussed In The Cybercriminal Underground? appeared first on . Read More HERE…

Read more

Movie Tech Review: Child’s Play 2019

A while back, Rik & Kasia Ferguson shared their thoughts on the movie, “Unfriended: The Dark Web.” The dark web and technology in general plays a pivotal role in the movie’s plot, so the team decided it would be interesting to have a real-world expert review. Everyone had a lot of fun, and thus Trend…
The post Movie Tech Review: Child’s Play 2019 appeared first on . Read More HERE…

Read more

Cybersecurity Leaders Are Talking A Lot About Counterfeit Devices

Malice Vs Greed Most discussion about security in the supply chain has been focused on detecting tampering, or preventing backdoors or sneaky things being inserted into components and software. There’s another aspect emerging and will dwarf the tampering: devices that are counterfeited for profit indirectly causing security problems. Counterfeit devices are ones that either by…
The post Cybersecurity Leaders Are Talking A Lot About Counterfeit Devices appeared first on . Read More HERE…

Read more

What Did We Learn from the Global GPS Collapse?

On April 6, 2019, a ten-bit counter rolled over. The counter, a component of many older satellites, marks the weeks since Jan 1, 1980. It rolled over once before, in the fall of 1999. That event was inconsequential because few complex systems relied on GPS. Now, more systems rely on accurate time and position data:…
The post What Did We Learn from the Global GPS Collapse? appeared first on . Read More HERE…

Read more

This Week in Security News: Cybersecurity Skills Gap and Legislature

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how the cybersecurity skills gap is affecting organizations. Also, learn how a bipartisan bill is working to close the gap. Read on: What Hacker History Can…
The post This Week in Security News: Cybersecurity Skills Gap and Legislature appeared first on . Read More HERE…

Read more

This Week in Security News: IoT Threats and Risks

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the threats and risks to complex IoT environments. Also, learn about new security challenges and risks the food production industry faces. Read on: Securing Smart…
The post This Week in Security News: IoT Threats and Risks appeared first on . Read More HERE…

Read more

Securing Smart Manufacturing with Connected Threat Defense

By David Tay, the CIO of Beyonics You’d be hard pushed to find any organization today not involved in digital transformation projects. But the manufacturing sector was arguably one of the first to the game. Back in 2011, the German government first coined the term Industry 4.0 to describe the opportunities stemming from use of emerging…
The post Securing Smart Manufacturing with Connected Threat Defense appeared first on . Read More HERE…

Read more

Parlez-vous Machine?

Have you ever heard of the MQTT or CoAP protocols? No? Well the device on your wrist, and so many devices around you, could be using them right now. MQTT and CoAP are machine-to-machine or M2M protocols. With the rise of the internet of things (IoT) and operational technology (OT), there’s increased security focused on…
The post Parlez-vous Machine? appeared first on . Read More HERE…

Read more