Remove Cyber Risk Remove IoT Remove Manufacturing
article thumbnail

FDA Playbook Engineers Safety Into Medical Device Manufacturing

SecureWorld News

As connected healthcare devices become more pervasive and critical to patient outcomes, the cyber risks tied to their design, production, and deployment grow exponentially. A core theme of the playbook is the shared responsibility between device manufacturers and their supply chain partners. In its latest white paper, the U.S.

article thumbnail

Protecting Oil and Gas Industry Infrastructure: Strategies for Resilience

SecureWorld News

Digital transformation: The integration of IoT, SCADA systems, and advanced analytics has increased operational efficiency but also expanded the attack surface. Leverage data analysis: Data analytics and IoT technologies are revolutionizing the oil and gas sector, enabling better monitoring and threat detection.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: Tenable Highlights Risks of AI Use in the Cloud, as UK’s NCSC Offers Tips for Post-Quantum Cryptography Adoption

Security Boulevard

In addition, find out how AI is radically transforming cyber crime. And get the latest on open source software security; cyber scams; and IoT security. 1 - Tenable: Orgs using AI in the cloud face thorny cyber risks Using AI tools in cloud environments?

article thumbnail

Story of the Year: global IT outages and supply chain attacks

SecureList

However, with great user experience come great cyber-risks, and as AI becomes more widespread, the likelihood of it being chosen as an attack vector increases. It can provide temporary communication links when other systems are down; airlines, ships, and other moving platforms rely on it to provide onboard connectivity and more.

article thumbnail

Cybersecurity Snapshot: CISA’s Best Cyber Advice on Securing Cloud, OT, Apps and More

Security Boulevard

For more information about the threat from nation-state cyber attackers: What CISOs Need to Know About Nation-State Actors (InformationWeek) 4 Ways to Defend Against Nation-State Attacks (BankInfoSecurity) Growing Nation-State Alliances Increase U.S. Tenable was one of the 68 original signatories of the pledge.

article thumbnail

2025 Supply Chain Threat Landscape: AI, APIs, and the Weakest Link

SecureWorld News

Manufacturing and logistics firms, increasingly digitized and AI-driven, are acutely at risk: state-aligned hackers are "infiltrating the digital arteries of commerce" from ports to payment systems. Beyond software, hardware, and IoT devices, the supply chain is also a target. Each device can be a new weak link if not secured.

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

Cybersecurity is on the brink of significant transformation as we approach 2025, grappling with escalating complexities driven by advancements in technology, increasing geopolitical tensions, and the rapid adoption of AI and IoT. The emergence of shadow AIunauthorised AI tools used without IT approvalamplifies these vulnerabilities.