Poison in the Water: The Physical Repercussions of IoT Security Threats Energy & Utility June 4, 2021 3 min read
The OSI Model and You Part 1: Stopping Threats on the OSI Physical Layer CISO May 24, 2021 3 min read
When Digital Identity and Access Management Meets Physical Security Identity & Access October 3, 2019 4 min read
From Backhoes to Operating Systems: The Top Five ATM Security Weaknesses Advanced Threats August 8, 2019 6 min read
How Would You React? What ‘Killing Eve’ Can Teach Us About Social Engineering Fraud Protection May 24, 2019 5 min read
How I Hacked My Connected Car, and Other Thoughts on Vehicle Cybersecurity Endpoint December 17, 2018 7 min read
Threat Actors Use Malspam Campaign to Target Italian Users With sLoad Downloader December 5, 2018 2 min read