Mitigating IoT security risks through the use of deception technology
The internet of things is growing rapidly, and IoT-enabled devices are beginning to appear in all aspects of our lives. This not only impacts consumers, but also enterprises, as it is expected that over 50% of all organizations will have some form of IoT in operation in 2019. The number of...
Why security is the key to emerging technology — and vice versa
Over the last few years, the impact of digital technologies and platforms on organizations has amplified security concerns. Take the continually growing internet of things. The growth of analytics and the continued expansion of IoT provides customers and businesses greater connectivity and...
Don’t overlook IoT this National Cybersecurity Awareness Month
With October being National Cybersecurity Awareness Month, it is a good reminder that enterprises should be taking precautions around cybersecurity year-round. With IoT devices getting more sophisticated, more affordable and easier to come by, businesses need to make sure they are not overlooking...
Industry 4.0: Where the U.S. and EU could lose
Around the world, companies are automating their manufacturing systems more and more, including migrating toward "smart factories." Smart factories embrace Industry 4.0 practices such as using cyber-physical systems to monitor and control production and the use of sophisticated analytics to...
Securing industrial intelligence against attacks
Around the world, isolated industrial control systems (ICS) in manufacturing and critical infrastructure have been integrating with IT networks. From a business perspective, there are clear benefits to this in terms of gathering remote intelligence and simplified management. However, protecting...
Protecting the internet of things
Myriad articles have already been written regarding the internet of things. Advances in computing, communications and sensor technologies bring intelligence to previously passive objects, create new business models, drastically increase the volumes of data generated and improve the precision,...
How loT is influencing a new cybersecurity era
According to research from Juniper, spending on IoT cybersecurity will reach more than $6 billion globally by 2023, which the company relates to massive...
Cryptojacking infections are coming from inside your home

Cryptojacking has become a growing concern. Cybercriminals aren't satisfied with the available supply of vulnerable servers and PCs to hijack in order to mine their favorite cryptocurrency. So, they have added another rich source...
The military strategy behind cyberattacks and how they’re designed
Cyberwarfare can devastate economies with connected infrastructure. Military strategy uses such attacks because they're hard to defend against and very cost-effective. The Allies bombed German ball-bearing plants in World War II because destroying them would degrade the German production of...
Hacking the factory floor: Cybersecurity in smart manufacturing
When you think of hacking, you might think of viruses or ransomware attacks where computers are unable to operate unless a bitcoin is paid to an anonymous cybercriminal. In the manufacturing sector, the reality isn't quite so public. First, the practical physical realities of the industrial...