IoT and ICS Security

IOT and ICS Security

Digital Privateers: How Deepfakes and Data Brokers Threaten Privacy

Deepfake Fraud, Data Brokers Tracking Military Personnel

In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores ...
Protecting Critical Infrastructure: A Collaborative Approach to Security for ICS, OT, and IIoT

Protecting Critical Infrastructure: A Collaborative Approach to Security for ICS, OT, and IIoT

In an era where cyber threats to critical infrastructure are growing in both sophistication and frequency, securing Operational Technology (OT), […] ...
Interpol Operation Synergia ransomware phishing

Interpol Operation Shuts Down 22,000 Malicious Servers

Interpol, other law enforcement agencies, and cybersecurity firms teamed up for Operation Synergia II, shutting down 22,000 malicious servers that supported ransomware, phishing, and other attacks and arresting 41 people connected to ...
Security Boulevard
Leveraging Tabletop exercises to Enhance OT security maturity

Leveraging Tabletop exercises to Enhance OT security maturity

| | CISO, Incident Response, iot, OT, threats
Has your organization tested its OT security incident response plan in the last 6 months? Do you remember when you last checked your institutional OT security awareness levels? Are your OT security ...

IoT Security Failures Can Be Sh*tty

It’s hard not to see IoT security failures in the news because they can be dramatic, and this week was no different.  The Register reported that in Moscow a skyscraper-high plume of ...

October Can Be Scary

Every October brings both Halloween and National Cybersecurity Awareness Month (NCSAM).  Most people know about Halloween, but if you’re just coming up to speed on NCSAM here is some background.  National Cybersecurity ...
How to evaluate OT security program maturity

How to evaluate OT security program maturity

| | CISO, Incident Response, iot, OT, threats
An OT security program can lead to better resource use, improved security operations, and tangible gains for the security posture of an OT operator. The benefits of running an OT security program ...