article thumbnail

Protecting the energy sector’s industrial IoT

Security Boulevard

By Steve Hanna, Co-chair of TCG’s Industrial Work Group and IoT Work Group Many sectors now utilize Internet of Things (IoT) equipment to drive digital transformation, and ultimately increase automation and efficiency. The post Protecting the energy sector’s industrial IoT appeared first on Trusted Computing Group.

IoT 122
article thumbnail

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

The Last Watchdog

Here are a few key takeaways: The security bottleneck The next great leap forward in digital technologies will give us driverless ground transportation, green cities that continually optimize energy usage and self-improving medical treatments. An intolerable security bottleneck, in fact, is taking shape.

Software 182
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

In fact, memory attacks have quietly emerged as a powerful and versatile new class of hacking technique that threat actors in the vanguard are utilizing to subvert conventional IT security systems. Allegedly developed by US and Israeli operatives, Stuxnet was discovered circulating through Iranian nuclear energy facilities in 2010.

Hacking 212
article thumbnail

AT&T Cybersecurity Insights Report: Securing the Edge – Available today

CyberSecurity Insiders

Focuses on common edge use cases in six vertical industries – healthcare, retail, finance, manufacturing, energy, and U.S. 40% energy and utilities are in the mature stage. Delivers qualitative analysis – subject matter expert interviews with technical leaders across the cybersecurity industry. public sector.