The lack of standardization is one of the significant challenges when securing OT environments. Customizing and aligning OT security with the business is key, says Uday Deshpande, CISO at Mumbai-based L&T Group.
What's the outlook for moving from awareness to action when it comes to medical device cybersecurity? Dale Nordenberg, M.D., executive director of the Medical Device Innovation, Safety and Security Consortium, offers an assessment.
"Smart cities" projects face huge cybersecurity challenges as they adopt advanced technologies, including IoT systems, says Adnan Baykal of the Global Cyber Alliance.
Automotive smartphone apps that can be used to unlock or start a car pose new risks that must be managed, says Asaf Ashkenazi of Inside Secure, a mobile security firm, who provides risk mitigation insights.
ForeScout commissioned Forrester Consulting to see if organizations can adequately and accurately secure their networks with the rise of IoT-connected devices. While 76% agreed that they are rethinking their security strategies due to IoT security concerns, risk tolerance with IoT is shockingly high as well.
View the...
As a former healthcare CISO, Fortinet's Sonia Arista has a unique perspective on how cybersecurity vendors can best assist in the ongoing challenge of securing critical medical devices.
Industry attention has narrowed in on the threat of commonly known IoT devices and their potential safety implications to the home, but there is as much - if not more - to consider when exploring IoT threats in the enterprise.
Research into seven common enterprise IoT devices revealed that their core technologies,...
A Field Guide to Understanding IoT Attacks from the Mirai Botnet to Its Modern Variants
The infamous Mirai IoT botnet was responsible for some of the largest and most distributive DDoS attacks in recent history. Commanding hundreds of thousands of IoT devices, it sent shock waves through the security marketplace...
Smart cities contain IT, OT and IIOT environments at different scales, which are dependent on each other at variant degrees, but not managed centrally. The Global Cyber Alliance will explore the systemic risk and legal/compliance challenges that come with securing smart city initiatives and how they can be addressed....
The FDA's recently issued draft document updating its premarket medical device cybersecurity guidance originally issued in 2014 contains several important provisions, says regulatory attorney Yarmela Pavlovic, who explains the details.
Interconnected medical devices can pose tremendous risk to data security and patient safety. How can healthcare entities keep up with the ever growing list of vulnerabilities involving medical devices, and new emerging threats? A top FDA official provides an update on the state of medical device security, and FDA's...
As the pace of technology innovation continues to quicken - including the ability to make payments via everything from Alexa to Facebook Messenger - risk-based security is imperative to maintain a frictionless customer experience, says Tim Ayling of Kaspersky Lab.
Digital transformation (DX) continues to drive growth across financial services firms, creating new opportunities to increase revenue and foster innovation. Cloud - whether public, private or a hybrid approach - is foundational to achieving DX objectives, as is secure, resilient and scalable network connectivity....
The FDA's procedures for handling cybersecurity concerns in medical devices once they are on the market are deficient, according to a new federal watchdog agency report. But since that audit was conducted, the FDA has been aggressively ramping up its activities around device cybersecurity.
Many of the devices that go into so-called smart cities and buildings are not built to be secure, making it difficult for security operations centers to manage risk, warns Sarb Sembhi, CTO and CISO of Virtually Informed, who describes what needs to change.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.