IoT & ICS Security
Small, fast and easy. Pick any three.
By Seth Hall, Co-Founder & Chief Evangelist, Corelight Zeek has been the darling of security defenders looking to get deep visibility into network traffic. Over the last two decades, Zeek has become ...
Why Your OT/IoT Network Needs “Always On” Security and Visibility
Without “always on” security, you could miss significant indicators of malicious activity, and risk an OT security breach or downtime. The post Why Your OT/IoT Network Needs “Always On” Security and Visibility ...
Security Essential as Electric Vehicles Accelerate
The electric vehicle (EV) market continues to expand at a rapid pace and demonstrated strong year-over-year growth before the pandemic emerged. According to a recent survey by IEA, sales of electric cars ...
Disconnect Your TCL Smart TV From the Internet—NOW
Researchers are sounding the alarm about Android TVs from TCL. A pair of bugs make them serious targets for hackers, and the TVs have a Chinese backdoor ...
Why Linux Should Factor Into Your Security Strategy
Linux is a pervasive operating system—and for good reason. It’s lightweight, flexible, multi-architecture supportive and open source, all leading to loads of opportunity. Today, Linux-based systems run servers, mainframes, routers, smart cars, ...
Avionics Safety and Secured Connectivity: A Look at DO-326A/ED-202A, DO-355 and DO-356
One of the major improvements that the avionics industry is undergoing is an Internet of Things (IoT) upgrade. And this is inevitably affecting how airlines approach aircraft safety. From the beginning, safety ...
Massive IoT Disruption Coming to an OT Network Near You
Adoption of IoT will be highly disruptive for many OT environments. The use of billions of IoT devices will force critical infrastructure and industrial operators to adapt their device management and security ...
Cybercriminals Shift Tactics Against OT Networks
Most of the focus on security during the COVID-19 pandemic has been on employees working from home, accessing applications in the cloud or running on local servers in an office. However, a ...
How to make the future IoT more secure
IoT security begins with building secure software. Learn how to embed security into your SDLC to avoid becoming an easy target for hackers. The post How to make the future IoT more ...
Protecting the healthcare industry from cyber threats
2020 has been an inflex point for the healthcare industry. How can we help protect this critical sector from a growing number of cyberattacks? ...

