Security Experts:

long dotted


Impacted vendors have released security advisories in response to the FragAttacks Wi-Fi vulnerabilities. [Read More]
FragAttacks is a collection of 12 vulnerabilities that could expose all Wi-Fi devices to attacks, allowing attackers to hijack systems and steal user data. [Read More]
Researchers show how Tesla cars could have been hacked remotely, from a drone, without any user interaction. [Read More]
Researchers at Microsoft discovered 25 remote code-execution vulnerabilities affecting a wide range of IoT and OT devices the industrial, medical, and enterprise networks. [Read More]
Window Snyder — who has occupied security leadership positions at Microsoft, Mozilla, Apple, Fastly, Intel and Square — has launched a new IoT security company named Thistle Technologies. [Read More]
The UK government announced intentions to introduce legislation to improve the security of consumer smart devices, including smartphones [Read More]
The NAME:WRECK vulnerabilities could be abused to cause denial of service, execute arbitrary code remotely, or take control of vulnerable devices. [Read More]
Healthcare IoT cybersecurity and intelligence provider Cylera today announced a new $10 million funding round to drive plans for international expansion. [Read More]
Some of the security holes started being targeted mere hours after they were disclosed publicly. [Read More]
A US hacker collective on Tuesday claimed to have tapped into footage from 150,000 security cameras at banks, jails, schools, carmaker Tesla and other sites to expose "the surveillance state." [Read More]


rss icon

Yaniv Vardi's picture
Proactive risk management requires being able to examine and address risk from different yet complementary perspectives to bring context to the overall security of an OT environment.
Torsten George's picture
Today’s dynamic threatscape requires security professionals to adjust to an ever-expanding attack surface.
Justin Fier's picture
As IoT devices turn homes into ‘smart homes’, they also expose consumers to cyber-attacks in their everyday lives. The industry needs to bring its attention back to these issues and identify potential solutions.
Gunter Ollmann's picture
Securing smart cities offers many opportunities to rethink our assumptions on security and “level up” the discussion to solve problems at the ecosystem level.
Seema Haji's picture
Because blockchain can process millions of transactions accurately and in the right order, it can protect the data exchanges happening between IoT devices.
Gunter Ollmann's picture
In a world of over-hyped bugs, stunt hacking, and branded vulnerability disclosures, my advice to CISOs is to make security lemonade by finding practical next steps to take.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.