Cyber-Kinetic Threat
My article "The tangible threat of cyber-kinetic attacks" was published on CSO Online. Connecting physical objects and processes to the cyber world offers us capabilities that exponentially exceed the expectations of science fiction writers and futurists of past generations. But it also introduces disquieting possibilities. Those possibilities reach beyond cyberspace to threaten the physical world in which we live and – potentially – our own physical well-being.
Maritime Cybersecurity
The open seas have long attracted those who yearned for adventure. The risk of pitting oneself against a vast and unforgiving sea has tested sailors’ mettle for millennia. It’s not surprising that the maritime industry is one that thrives on facing – and overcoming – risks. But, as technology increasingly dominates it, growing risks exist that the industry dare not ignore. Its growing effort to increase efficiencies through digitization and automation has made it an inviting target for 21st century pirates whose weapons are not cutlasses, but computers. Vulnerabilities in maritime systems and security practices threaten to inflict huge losses...
Cyber-Kinetic Threat
A growing number of today’s entertainment options show protagonists battling cyber-attacks that target the systems at the heart of our critical infrastructure whose failure would cripple modern society. It’s easy to watch such shows and pass off their plots as something that could never happen. The chilling reality is that those plots are often based on real cyber-kinetic threats that either have already happened, are already possible, or are dangerously close to becoming reality. Cyberattacks occur daily around the world. Only when one achieves sufficient scope to grab the attention of the news media – such as the WannaCry ransomware...
Cyber-Kinetic Future
My article "Our smart future and the threat of cyber-kinetic attacks" is published on HelpNetSecurity. Like most of my writing, the article focuses on cyber-kinetic threats of industrial control systems and how the rapid adoption of IoT keeps exponentially increasing the threat.
Protecting smart technologies and IoT from Cyber-Kinetic attacks
My article "Protecting smart technologies and IoT from cyber-kinetic attacks" is published on IoT Agenda. The article highlights the cyber-kinetic threats of the IoT. From the article intro: "Making physical objects or systems “smart” is all the rage today. Terms like smart houses, smart cars, smart cities, smart grids, smart refrigerators and even smart hairbrushes pop up everywhere. But there’s something not smart in the way this trend is progressing. Securing smart systems is being often overlooked."
Crowdstrike - Cyber Intrusion Services Casebook
Crowdstrike published its annual Cyber Intrusion Services Casebook. Drawn from 100 real-life client engagements, the report looks into ever-evolving attacker tactics, techniques and procedures (TTPs) and reveals emerging trends observed in attack behaviors, including the preferred tactics used by threat actors to gain entry to the targeted environment.
Industrial Cyber Security CEO
Honeywell released a new study "Putting Industrial Cyber Security at the Top of the CEO Agenda" showing industrial companies are not moving quickly to adopt cyber security measures to protect their data and operations, even as attacks have increased around the globe.
BlackBerry's 7-Pillar Recommendation for Automotive Cybersecurity
BlackBerry has published its recommended framework to protect cars from cybersecurity threats. According to BlackBerry, the real challenge is securing the supply chain manufacturing these smart vehicles. With so many actors in the supply chain space individually contributing hardware or software, there is a higher risk of one of them accidentally introducing something harmful or not fully securing a part, which could result in the entire vehicle being compromised. The whitepaper lays out seven crucial security recommendations to harden automobile electronics from cyber attacks.
Key Safety Challenges for IIoT
Industrial Internet Consortium published a new white paper "Key Safety Challenges for the IIoT". The white paper addresses four key challenges in IIoT security and offers why other current safety frameworks are falling short, and recommends what can be done to further mitigate these challenges.
Western European Cities Exposed
Trend Micro released the latest in the series of Shodan-based security studies on exposed city cyber asset. Earlier this year they released the report on exposed US cities, and now they looked into Europe, looking not only at Western European capitals, but deeper into three of its largest countries – Germany, France, and the United Kingdom.
Discovering Consumer Attitudes Toward Connected Car Security
Thales conducted a survey of 1,000 consumers across the U.S. and UK. Few interesting findings: Ownership of internet-connected cars is on the rise. 28% in the U.S. (increased from 24% in 2016) and 18% in the UK. Due to the current threat landscape people are very worried about security...
Slaughterbots
Interesting short video depicting a very scary future in which swarms of killer microdrones are dispatched to kill political activists and US lawmakers. Armed with explosive charges, the palm-sized quadcopters use real-time data mining and artificial intelligence to find and kill their targets.
Cyber Risk Management
Excellent article from Harvard Business Review. The author recognizes that the members of the C-suite often aren’t speaking the same language around cyber risk and that the reporting lines and silos are impacting the enterprise-wide communication and coordination required to address new cyber risks...
Forrester and ForeScout Research on IoT and OT Security Challenges
ForeScout commissioned Forrester Consulting to see if organizations can adequately and accurately secure their networks with the rise of IoT-connected devices. The study sheds additional insight into this issue that may be surprising...