IoT and ICS Security

IOT and ICS Security

Hacked Robot Vacuums Shouting Slurs & Secret Printer Tracking Dots!

Hacked Robot Vacuums, Secret Printer Tracking Dots

In episode 351, hosts Tom and Scott explore an unusual incident where robot vacuums were hacked to shout obscenities, exposing significant IoT security issues. The discussion includes the mechanics of the Bluetooth ...
AI emerging technology secure by design cybersecurity

World Economic Forum: AI, Quantum Require ‘Paradigm Shift’ in Security

The World Economic Forum is advocating a shift in security thinking from secure by design to resilience by design in the face of the rapid development and expanding connectivity of emerging technologies ...
Security Boulevard
Launching a critical infrastructure security program in 4 phases

Launching a critical infrastructure security program in 4 phases

| | CISO, Incident Response, iot, OT, threats
As per the Cybersecurity and Infrastructure Security Agency (CISA), threat actors were still leveraging brute force intrusions, default credentials, and other unsophisticated attack methods to target internet-exposed operational technology and industrial control ...

More Details on Israel Sabotaging Hezbollah Pagers and Walkie-Talkies

The Washington Post has a long and detailed story about the operation that’s well worth reading (alternate version here). The sales pitch came from a marketing official trusted by Hezbollah with links ...
Simple yet essential cybersecurity strategies for ensuring robust OT security

Simple yet essential cybersecurity strategies for ensuring robust OT security

| | CISO, Incident Response, iot, OT, threats
At the heart of an OT security strategy lies the ability to clearly distinguish IT and OT security. Since both share tech, operational goals, and to some extent an enabling mission, it ...
10 steps for reducing ICS asset risk exposure

10 steps for reducing ICS asset risk exposure

| | CISO, Incident Response, iot, OT, threats
The level of asset risks that OT operators are exposed to varies according to industries and the asset security management practices that they have adopted. Assets lie at the heart of almost ...