Nozomi Networks Labs’ new OT/IoT Security Report covers cyberattack trends, vulnerability research, and best practices in remediation efforts.

Army of the Undone: Securing IoT Across Critical Sectors

The post Army of the Undone: Securing IoT Across Critical Sectors appeared first on Nozomi Networks ...
Zero Trust for OT and IoT - Nozomi Networks

Don’t Trust But Verify: Getting to Zero Trust for OT and IoT

Zero trust requires knowing how systems interact and how to minimize information access. This isn’t simple to apply, especially for existing OT and IoT systems. The post Don’t Trust But Verify: Getting ...
Multi-Step Attack Vectors: When Vulnerabilities Form an Attack Chain

Multi-Step Attack Vectors: When Vulnerabilities Form an Attack Chain

Praetorian’s approach to cybersecurity centers around a core belief that combining innovative technologies and the best people in the business leads to real results. In our experience, neither can fully solve cybersecurity ...
inter-chip threat model image 1

Inter-Chip Communication: Design Considerations to Mitigate Commonly Overlooked Attack Paths

Introduction At Praetorian, we perform security assessments on a variety of Internet of Things (IoT) devices ranging from commodity home “smart” devices, medical devices, critical infrastructure, and autonomous vehicles. While previous blog ...

Purdue University’s CERIAS 2021 Security Symposium – Indiana University ‘s Scott Shackelford: ”

Our thanks to Purdue University’s The Center for Education and Research in Information Assurance and Security (CERIAS) for publishing their illuminating security symposiums, seminars, talks, and presentations on the Schools’ YouTube channel ...

Securing Smart Cities: What You Need to Know

Due to urbanization, which involves a complex set of economic, demographic, social, cultural, technological, and environmental processes, governments are developing smart cities to address some of the challenges unique to urban areas. This ...
Security for IoT Networks Needs to Reflect an OT Mindset

Security for IoT Networks Needs to Reflect an OT Mindset

| | All, Blog, Convergence, IoT Security
The post Security for IoT Networks Needs to Reflect an OT Mindset appeared first on Nozomi Networks ...
DEF CON 29 IoT Village

DEFCON 29 IoT Village – Barak Hadad’s And Gal Kaufman’s ‘Reverse Supply Chain Attack’

Our thanks to DEFCON for publishing their outstanding DEF CON 29 IoT Village videos on the Conferences’ YouTube channel. Permalink ...