When White Hats Go Grey

The way it’s supposed to work, white hat security researchers find vulnerabilities and report them to the offending company giving that company time to provide a patch before the vulnerabilities are published. It is what “good guys” do.Cybersecurity company Medsec took a different path. After discovering vulnerabilities in St. Jude Medical’s pacemakers and defibrillators, they approached... Read more

When it Comes to Alarm Management, Don’t Reinvent the Wheel

I recently presented at the Ocean Energy Safety Institute Seminar on Focusing on Alarm Management for Safer Offshore Operations. It was exciting to hear what peers in other industries had to say regarding their approach to alarm management. The panel included professors from Texas A&M University and representatives from Schlumberger, NASA, and the chemical, petrochemical, and power industries.At the... Read more

Innovation Convergence: The Future is Now

I love hearing from tech leaders who live and work on the bleeding edge. Topics that the rest of us consider futuristic are addressed by tech pioneers in the context of here and now – just as necessary and commonplace as prioritizing your to-do list or choosing a restaurant for tonight’s dinner. At a technology law conference in Austin last week, leaders from companies like Tesla, Rackspace, and... Read more

Are We Four Lines of Python Away from Cybersecurity Trouble?

A USA Today reporter recently interviewed the guys who hacked the Jeep Cherokee last year. One of the white hats said something that was particularly distressing. He said that he wrote “four lines of python and owned [had access to] 1.4 million cars.” What gets me is not that he did it (he revealed their hack to Fiat/Chrysler before publishing), but that a hunk of metal traveling down the road at 60 or... Read more

When ICS Cybersecurity Gets Personal: The Risk of the Disgruntled Employee

In recent news, we’ve learned that a former Georgia-Pacific IT specialist is now facing prison time and significant fines following the cyber attack he waged upon his ex-employer – an attack which occurred just days after he was fired by the company. He caused disruption at the Port Hudson paper mill targeting the distributed control system (DCS) and quality control system for the machinery used to... Read more

Displaying results 21-25 (of 42)
 |<  <  1 2 3 4 5 6 7 8 9  >  >| 

This site would like to place a cookie on your browser to help us better deliver relevant and valuable content to you.