IoT Security Fundamentals: Intercepting and Manipulating Wireless Communications

| | Hacking
Introduction: IoT Manufacturers Favor Convenience over Security Because IoT security is still an afterthought, cybercriminals in general consider smart devices a “low-hanging fruit” – a target easy... Go on to the site to read the full article ... Read More

IoT Security Fundamentals: IoT vs OT (Operational Technology)

Introduction: Knowing the Notions  Industrial Internet of Things (IIoT) incorporates technologies such as machine learning, machine-to-machine (M2M) communication, sensor data, Big Data, etc. This... Go on to the site to read the full article ... Read More

Data Loss Protection (DLP) for ICS/SCADA

Introduction Data loss prevention (DLP) is a strategy that seeks to avoid the deletion, corruption or leakage of confidential or proprietary data stored on company devices, networks and servers.... Go on to the site to read the full article ... Read More

Least Privilege Vulnerabilities Exploitation Case Study

Introduction The principle of least privilege is a security concept that limits security exposure in IT environments through balancing security, productivity, privacy and risk. To put it simply,... Go on to the site to read the full article ... Read More

Data Security in Windows 10

Introduction By design, Windows 10 is more secure than its predecessors Windows 7 and Windows 8.1. That’s what the people from Microsoft say, anyway. One excellent measuring tool regarding security... Go on to the site to read the full article ... Read More

Windows 10 Security Features

Introduction Alexander Benoit, senior consultant and head of Competence Center Microsoft, said something during a Microsoft event in Orlando in September 2017: “Because the threat landscape... Go on to the site to read the full article ... Read More
Key Elements of an Information Security Policy

Key Elements of an Information Security Policy

Learn about SCADA security policies Learn the process of developing a SCADA security policy. This skills course covers: ⇒ Developing SCADA security policy ⇒ Security frameworks and strategy ⇒ And... Go on to the site to read the full article ... Read More

Intrusion Detection and Prevention for ICS/SCADA Environments

Introduction Although the target audience for this writing is information security professionals such as ICS & SCADA or automation managers and engineers, it may also be useful to other IT... Go on to the site to read the full article ... Read More

Network Forensics Overview

Introduction: Start with the basics Most attacks move through the network before hitting the target and they leave some trace. According to Locard’s exchange principle, “every contact leaves a... Go on to the site to read the full article ... Read More

ICS Strengths and Weaknesses (from security perspective)

Introduction We all know that Industrial Control Systems (ICSes) have very specific dynamics. In this article, we’ll take a closer look at their strengths and weaknesses. The first part of this... Go on to the site to read the full article ... Read More
Loading...