As OT environments, especially with legacy systems in place, become increasingly connected, they may inherit OT security risks that were previously the domain of the IT environment.
How does Star Trek's information security stack up against current cybersecurity hygiene best practices? Turns out the future's not so bright.
When developing and deploying internet of things solutions, achieving security by design is not as simple as picking a secure development life cycle (SDLC) framework and shifting your security left.
Let's talk operational technology security: How can companies devise a winning OT security strategy to bridge the physical/digital divide?
Is providing effective cybersecurity for the healthcare sector an IT problem or a wider-scope issue? The short answer is that it's both.
The rollout of 5G technology could forever change how we manage mobile security, posing an entirely new set of risks we have not handled before.
The Belkin Wemo Insight smart plug continues to be at risk of zero-day attacks nearly one year after a vulnerability was first disclosed, security researchers discovered.
If we focus on the future at the expense of performing risk assessments to maintain defenses against existing threats, we will always be one step behind attackers.
Smartphones, tablets and cloud computing have been leading the way in the workplace until now, but the growing popularity of the internet of things could totally change the look of IT infrastructure.
Securing IoT projects requires a thorough understanding of your technology infrastructure, its services and components, and how they relate to each other.