Lennert Wouters, a researcher at KU Leuven University in Belgium, has spent the past eight years studying embedded security, analyzing the vulnerabilities of everyday devices and commercial products. He shares his greatest hacks and insights on hardware security industry trends.
The United States Coast Guard is continuing to warn of significant security risks embedded in ship-to-shore cranes developed by companies with ties to Beijing while issuing new sensitive requirements for ports operating Chinese-made cranes across the country.
Vulnerabilities in a smart building energy management system including an easily exploitable, two-year-old flaw that hasn't been widely patched could let hackers take over instances misconfigured to allow internet exposure. The flaws affect Cylon Aspect software from electrical engineering firm ABB.
Remote support has revolutionized operational efficiency in industrial settings. As demand for remote access solutions grows, covering everything from diagnostics to troubleshooting, ensuring security in each step is crucial. Securing remote access is a complex challenge that requires thoughtful strategy.
View this...
Privileged access management plays a critical role in securing both IT and OT environments. Graham Hawkey of WALLIX outlined the unique challenges organizations face in securing legacy OT systems. He advises shifting from outdated VPNs to more robust access methods to protect against cyberthreats.
As industrial environments become increasingly complex—with more systems, data, and remote locations—the challenge of managing secure access and threat detection intensifies. The latest CISA directive emphasizes the need for comprehensive asset visibility and vulnerability management, highlighting a crucial gap in...
As industrial environments become increasingly complex—with more systems, data, and remote locations—the challenge of managing secure access and threat detection intensifies. The latest CISA directive emphasizes the need for comprehensive asset visibility and vulnerability management, highlighting a crucial gap in...
Industrial control systems made by different manufacturers for monitoring fuel storage tanks including those used in everyday gas stations contain critical zero-days that could convert them into targets for cyberattacks that cause physical damage.
Digitalization is rapidly transforming the utilities sector, driven by the need to reduce carbon emissions, enhance efficiency, and meet evolving consumer demands. However, as this sector evolves, it also becomes more exposed to risks.
Check out this whitepaper to see the common risks associated with an insecure...
Remote support is transforming operational efficiency in industrial settings, making a significant impact in our increasingly digital and fast-paced environment. From diagnostics and monitoring to data transfer and troubleshooting, the demand for robust remote access solutions is higher than ever. However, securing...
Excessive deployment of remote access tools in operational technology environments expands attack surfaces and creates operational challenges, warn security researchers from Claroty. Remote access tools are essential, but they introduce numerous potential vulnerabilities that threat actors exploit.
An artificial intelligence-fueled growth in data center construction has the federal government asking what it should do to help manage data security risks. The NTIA is interested in identifying opportunities "to improve data centers’ market development, supply chain resilience, and data security."
A new artificial intelligence-based protection system developed by the German government-funded SecDER project is revolutionizing the security of virtual power plants by detecting cyberattacks and predicting failures, according to Fraunhofer SIT Institute Darmstadt.
Download the report to find out more about how Gartner® defines the SSE space and to see what Gartner® has to say about the other recognized SSE vendors.
As IT and security teams struggle to deliver consistent security across a hybrid environment, we believe FortiSASE will solve this challenge and will:
Secure...
Digital innovation, cloud adoption, and the shift to a hybrid workforce have fundamentally transformed the network. As organizations increasingly rely on cloud-based resources, such as SaaS applications, the
need for a new approach to secure network access — especially the challenges of implicit trust inherent in...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ot.today, you agree to our use of cookies.