IoT & ICS Security
Security Podcasting, Hacking Stories, and The State of Firmware Security with Paul Asadoorian
Tom Eston | | Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Embedded Systems, Episodes, firmware, firmware security, Greatest Hacks, Information Security, Infosec, Internet, Internet of things, iot, Paul Asadoorian, Pauldotcom, Pauls Security Weekly, Podcast, Podcaster, Podcasts, Privacy, Product, Product Security, security, Security Podcasts, Security Weekly Podcast, security-weekly, technology, Weekly Edition
Paul Asadoorian, OG security podcaster and host of the popular Paul’s Security Weekly podcast, joins us in this episode to talk about his career as one of the original security podcasters. Paul’s ...
Connected Devices Conspicuously Absent from 2023 Verizon Data Breach Investigations Report
The 2023 Verizon Data Breach Investigations Report is out. Like most folks in the cybersecurity industry, we downloaded it and pored over the contents to see what was new and relevant and ...
Manufacturing Industry Cybersecurity Best Practices
Nik Hewitt | | advice, applications, Best Practices, device protection, iot, IT-OT, lateral movement, microsegmentation, Security Research, zero trust
Critical gaps in manufacturing industry cybersecurity, exposing organizations to regulatory pitfalls and downtime, need robust protection and team insight Cybersecurity has become a crucial concern for the production sector, with manufacturing industry ...
Medical Device Security: Securing IT and OT Healthcare
Nik Hewitt | | application protection, Best Practices, device protection, iot, IT-OT, microsegmentation, security, Security Research, zero trust
“First, do no harm.” A vital preemptive necessity, IT and OT medical device security has never been more important than right now. Modern healthcare leans heavily on Information Technology (IT) and Operational ...
Your Personal Data Sold to US Intelligence Agencies
Richi Jennings | | 4th Amendment, Data Brokers, Director of National Intelligence, Fourth Amendment, Information Brokers, ODNI, Privacy, SB Blogwatch
What Price 4th Amendment? Warrant not needed if info bought from brokers ...
Security Boulevard
COSMICENERGY Malware May be Artifact of Russian Emergency Response Exercises
Malware intended to disrupt electric power by remote terminal units (RTUs) and other IEC 104 devices and may be related to Russian emergency response exercises. The new operational technology (OT)/industrial control system ...
Security Boulevard
Palo Alto Networks Finds Cyberattack Patterns Changing
An analysis of cyberattacks published by the Unit 42 research arm of Palo Alto Networks found a significant increase in attempts to mimic generative artificial intelligence (AI) sites on the web using ...
Security Boulevard
What Businesses Need to Know About the EU IoT Bill
The Cyber Resilience Act is a world first. Europe’s proposed legislation will set minimum cybersecurity standards for connected devices and require products to stay up-to-date throughout their lifespan. The bill will be ...
Security Boulevard
5G and Cybersecurity Risks in 2023
The rollout of 5G networks has been surprisingly slow. As a concept, it was introduced in 2016, but it only became globally available in 2019. Four years later, the number of people ...
Security Boulevard
Dark Web Threats Target Energy Industry as Cybercrime Tactics Shift
The energy industry is increasingly targeted by malicious actors and threat groups through activity on the dark web, according to a report from Searchlight Cyber, which detailed numerous instances of threat actors selling initial ...
Security Boulevard