Cyber-Kinetic Security Articles

IIoT and Trust and Convenience: A Potentially Deadly Combination

IIoT 5G Trust Security
When microwave ovens first arrived on the market in 1967 they were met with public skepticism. Perhaps it was because, not long before, the same technology now promising to safely cook consumers’ evening meals was the backbone of a military radar. Perhaps it was...

5G Network: A Quantum Leap in Connectivity – and Cyber Threats

5G Connectivity Security
The timeline of human history is marked by inflection points of major technological advancement. The plow, the printing press, the telegraph, the steam engine, electricity, the telephone, the internet: each of these breakthroughs precipitated tectonic shifts in how people lived and worked. Now, in...

Risks of AI (Artificial Intelligence) – Meeting the Ghost in the Machine

Risks of AI
In 1956, at a workshop on the campus of Dartmouth College, in Hanover, New Hampshire, the field of artificial intelligence (AI) was born. Attendants were buoyant. MIT cognitive scientist Marvin Minsky was quoted as saying, "Within a generation  the problem of creating 'artificial intelligence'...

5G Critical Infrastructure – the Most Critical of All

5G Critical Infrastructure
Not even 30 years separate us from the end of the Cold War. Yet, we appear to be witnessing the emergence of a new one, a technology Cold War between the United States and China. This time, instead of a ‘red under...

5G Security & Privacy Challenges

5G Security
Don’t let the “5G” in the title confuse you. This post is not only about the telcos’ core networks, but about the 5G security and privacy issues in our (very) near, and very different future that 5G will enable. In the 5G-enabled...

Cyber-Kinetic Security and Privacy Threats in Smart Cities

Smart City 5G Privacy
More than half of the world’s population lives in cities. The UN estimates that by 2050 that proportion will be 68% - more than 6 billion people living in high-density conditions. This raises significant challenges. What is the best way to ensure...

Cyber-Kinetic Risks: The Unintended Consequence of IoT in a 5G World

Cybersecurity IoT 5G Cyber-Kinetic Risks
Getting smart about security in smart systems Smart used to be something we called people or pets. It wasn't a term one would use to describe one's hairbrush. That is changing, of course, in an era of accelerating...

Cyber-Kinetic Security News

NATO 5G Security Geopolitics

NATO Will Assess Potential Security Implications of 5G Gear

On 14th March 2019, NATO Secretary General Jens Stoltenberg at the launch of his Annual Report for 2018 touched on security and...
Germany 5G Security Standard

Germany Will Define Its Own Security Standards for 5G Security

After Washington last week warned Germany that it would scale back intelligence data-sharing with Berlin if China’s Huawei was allowed to participate...
5G Security GSA

GSA – 5G Security Primer Whitepaper

The Global mobile Suppliers Association (GSA) today issued a 5G Security Primer whitepaper. The whitepaper provides a top-level overview of the security...
Cyber-Kinetic Security Railway

Growing cyber-kinetic threats to railway

My article "Growing cyber-kinetic threats to railway systems" was published on CSO Online. Cybersecuring railway systems from potential attackers must become paramount in the digitization that those systems currently undergo. Their cybersecurity is too closely interlinked with the railway safety to leave the door open to disruption. To make matters worse, they are increasingly being targeted.
IEMI

Intentional Electromagnetic Interference – the overlooked threat to IoT

As IoT adoption continues to proliferate, manufactures and adopters are increasingly aware of cybersecurity risks to IoT. Yet, even among the IoT security professionals, one significant potential remote attack vector is often overlooked: intentional electromagnetic interference (IEMI).

Stuxnet: father of cyber-kinetic weapons

My article "Stuxnet: the father of cyber-kinetic weapons" was published on CSO Online. As we approach the 10th anniversary of when Stuxnet was (likely) deployed, it is worthwhile to examine the effect it still has on our world. As the world’s first-ever cyberweapon, it opened Pandora’s box. It was the first true cyber-kinetic weapon – and it changed military history and is changing world history, as well. Its impact on the future cannot be overstated.
Maritime Cybersecurity

Defeating 21st Century pirates: the maritime industry and cyberattacks

My article "Defeating 21st Century pirates: the maritime industry and cyberattacks" was published on CSO Online. From the article: Digitization in the maritime industry is growing, and cyberattacks are growing along with it. Attackers achieve massive paydays when maritime targets leave vulnerabilities open. If the maritime industry is to enjoy the potential that digitization can bring, it must put cybersecurity in the forefront instead of on the back burner.
Cyber-Kinetic Threat

The tangible threat of cyber-kinetic attacks

My article "The tangible threat of cyber-kinetic attacks" was published on CSO Online. Connecting physical objects and processes to the cyber world offers us capabilities that exponentially exceed the expectations of science fiction writers and futurists of past generations. But it also introduces disquieting possibilities. Those possibilities reach beyond cyberspace to threaten the physical world in which we live and – potentially – our own physical well-being.
Cyber-Kinetic Future

Our smart future and the cyber-kinetic threat

My article "Our smart future and the threat of cyber-kinetic attacks" is published on HelpNetSecurity. Like most of my writing, the article focuses on cyber-kinetic threats of industrial control systems and how the rapid adoption of IoT keeps exponentially increasing the threat.
Protecting smart technologies and IoT from Cyber-Kinetic attacks

Protecting smart technologies and IoT from cyber-kinetic attacks

My article "Protecting smart technologies and IoT from cyber-kinetic attacks" is published on IoT Agenda. The article highlights the cyber-kinetic threats of the IoT. From the article intro: "Making physical objects or systems “smart” is all the rage today. Terms like smart houses, smart cars, smart cities, smart grids, smart refrigerators and even smart hairbrushes pop up everywhere. But there’s something not smart in the way this trend is progressing. Securing smart systems is being often overlooked."
Crowdstrike - Cyber Intrusion Services Casebook

Report: CrowdStrike – 2017 Cyber Intrusion Services Casebook

Crowdstrike published its annual Cyber Intrusion Services Casebook. Drawn from 100 real-life client engagements, the report looks into ever-evolving attacker tactics, techniques and procedures (TTPs) and reveals emerging trends observed in attack behaviors, including the preferred tactics used by threat actors to gain entry to the targeted environment.
Industrial Cyber Security CEO

Survey: Honeywell – Putting Industrial Cyber Security at CEO Agenda

Honeywell released a new study "Putting Industrial Cyber Security at the Top of the CEO Agenda" showing industrial companies are not moving quickly to adopt cyber security measures to protect their data and operations, even as attacks have increased around the globe.
BlackBerry's 7-Pillar Recommendation for Automotive Cybersecurity

Blackberry – 7-pillar Recommendation for Automotive Cybersecurity

BlackBerry has published its recommended framework to protect cars from cybersecurity threats. According to BlackBerry, the real challenge is securing the supply chain manufacturing these smart vehicles. With so many actors in the supply chain space individually contributing hardware or software, there is a higher risk of one of them accidentally introducing something harmful or not fully securing a part, which could result in the entire vehicle being compromised. The whitepaper lays out seven crucial security recommendations to harden automobile electronics from cyber attacks.
Key Safety Challenges for IIoT

Key Safety Challenges for the IIoT

Industrial Internet Consortium published a new white paper "Key Safety Challenges for the IIoT". The white paper addresses four key challenges in IIoT security and offers why other current safety frameworks are falling short, and recommends what can be done to further mitigate these challenges.
Discovering Consumer Attitudes Toward Connected Car Security

Discovering Consumer Attitudes Toward Connected Car Security

Thales conducted a survey of 1,000 consumers across the U.S. and UK. Few interesting findings: Ownership of internet-connected cars is on the rise. 28% in the U.S. (increased from 24% in 2016) and 18% in the UK. Due to the current threat landscape people are very worried about security...
Cyber Risk Management

Why the Entire C-Suite Needs to Use the Same Metrics for Cyber Risk

Excellent article from Harvard Business Review. The author recognizes that the members of the C-suite often aren’t speaking the same language around cyber risk and that the reporting lines and silos are impacting the enterprise-wide communication and coordination required to address new cyber risks...

Our most popular articles