A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Read how organizations must draw up a security framework for their IoT solutions and proactively adopt best practices to efficiently mitigate security risks.
Innovation in Industrial Control Systems (ICS) may well be helping businesses get the best from their data, but it’s also helping cyber attackers see new ways to attack these critical systems.
Incorporating cybersecurity best practices in developing IoT systems is swiftly becoming the need of the hour. And businesses must put their best foot forward since customer engagement and trust begin with the assurance of information security.
Creating and building a “Secure Smart City” requires strong Private Public Partnerships that incorporate people, policies, processes and technology from both government and industry into the overall strategy process.
Keeping IoT safe in the future will require securing the networks themselves. Focusing on the devices is a never-ending battle that will only become more burdensome.
5G networks are exciting and open the door to many new possibilities for IoT, however it also comes with security risks as manufacturers rush to dominate the new untapped market their devices.
New guidelines offer a data template for cities to apply across sectors and initiatives to increase cyber-physical security and compliance and minimize risk.
While securing OT systems can seem overwhelming…the task is not impossible. The power of attack surface management provides the technology needed to lock down assets in your organization.
For today’s fragmented Internet of Things (IoT) to reach its potential as a fully interconnected ecosystem, the answer may lie in the convergence of cybersecurity and the IoT.
Operational technology (OT) networks control the devices critical to the continued operations of production lines, power plants, and energy supplies, and as such are typically segmented from a company’s internet-facing IT networks to better isolate critical hardware from cyberattacks. Now security researchers are warning of the risks posed by the embedded devices that sit on those OT networks.
New research on cyberattacks in the sector show that despite rising incidents healthcare providers remain inadequately protected and perpetrators continue to escape justice.
Increasing connectivity through 5G networks also comes with heightened cybersecurity threats, authorities need to build security regimes that protect not only 5G infrastructure and services, but the applications and IoT devices.
Smart Cities are undoubtedly the future. It has brought an onset of new technology, new developments in infrastructure solutions and even enhanced the original concept of smart cities.
As networks become increasingly complex and the growth of the Internet of Things shows no signs of slowing, the challenge of keeping businesses cyber secure and minimising risk is greater than ever.
Cyber-criminals are the new entrepreneurs of the 21st Century: intelligent business people who have identified innovative ways to capitalise on others’ failings. They succeed because the attack surface is expanding and security hasn’t been built into networks and devices from the ground up.
To get content containing either thought or leadership enter:
To get content containing both thought and leadership enter:
To get content containing the expression thought leadership enter:
You can enter several keywords and you can refine them whenever you want. Our suggestion engine uses more signals but entering a few keywords here will rapidly give you great content to curate.