Perspectives from S4 in Miami

I attended the S4 ICS Security conference in Miami last week and really enjoyed the different perspectives and priorities people have for securing control systems. Many vendors and end users were in attendance, and it was a great forum to exchange ideas. Hats off to Digital Bond for creating an event that provides such a collaborative environment.  Below are some of the key messages I took from the... Read more

Protect the Industrial Endpoints that Matter the Most

In recent years, demand for improved endpoint protection has exploded. Modern Endpoint Threat Detection and Response (EDR) is the latest cybersecurity trend having emerged because of new, more advanced, and targeted threats. Endpoint protection solutions leverage modern behavioral, host-based protection primarily to detect zero-day exploits. Many EDR solutions also include more traditional anti-malware protection including... Read more

Let's Make Cybersecurity Great Again!

There Actually is Not a U.S. President-Elect YetIn the United States, we had a big event happen in November – the presidential election. Maybe you heard about it once or twice. One thing I find interesting about our election is how unaware most U.S. citizens are about how and when our president is elected. Even though the media has been stating hundreds of times a day that we now have a president-elect in Mr... Read more

Is it Safe?

Another milestone in life, my teenage daughter is learning to drive. I’ll freely admit to being a bit anxious about it. I recall her and her younger siblings playing with toy cars, and I don’t remember it ending well for the cars…My training as an engineer has taught me to seek out potential hazards and look for ways to address them. I have every confidence in the ability of my daughter to safely navigate... Read more

When White Hats Go Grey

The way it’s supposed to work, white hat security researchers find vulnerabilities and report them to the offending company giving that company time to provide a patch before the vulnerabilities are published. It is what “good guys” do.Cybersecurity company Medsec took a different path. After discovering vulnerabilities in St. Jude Medical’s pacemakers and defibrillators, they approached... Read more

Displaying results 1-5 (of 26)
 |<  < 1 2 3 4 5 6  >  >|