Telecommunications companies are a prime target for cyberattackers. Whether it’s a private group infecting systems with ransomware in the hopes of monetary gain or state-backed organizations attempting to spy on adversaries, telcos have...
Going Beyond the 7 Properties: How CoreGuard Exceeds Microsoft's Properties of Highly Secure Devices
In Microsoft’s white paper, Seven Properties of Highly Secure Devices, Microsoft researchers outline the seven “must-haves” for devices that claim security and safety. As argued in the paper, all too often security is sacrificed in the name of...
As 5G continues to roll out across the globe, it promises a hyperconnected world with fast downloads and low latency. These benefits of 5G in turn mean more complex systems—AI powered systems like smart cities and autonomous vehicles—are no...
Before we can begin to tackle the cybersecurity issues created by the introduction of 5G, it’s important to first understand what exactly 5G is. Don’t worry, it’s wavelengths don’t damage your immune system, nor is it responsible for the spread...
There are three guarantees in life: death, taxes, and that software will have vulnerabilities. Through countless tests and studies, it has time and again been proven that for every thousand lines of code, there will be an average of between ...
In 2014, an unnamed German Steel Mill suffered a sophisticated cyberattack that targeted the industrial control systems of a blast furnace, causing the furnace to shut down improperly. This unstable and improper shutdown caused “massive damage”...
Artificial intelligence (AI) applications are increasingly being integrated into our everyday lives. Smart thermostats use AI to learn our schedules and adjust temperatures, AI applications in self-driving cars enable them to navigate and respond...
Ensuring the safety of their systems is a top priority for organizations operating within Industry 4.0. Anything from heavy-duty machinery in a smart factory to environmental sensors in an energy plant—all are potentially dangerous if they don’t...
There is perhaps no cyberattack more infamous or dangerous than the 2009 Stuxnet attack. It was the first ever weaponized cyberattack.
The Internet of Things (IoT) has evolved dramatically since its conception, and our world alongside it. The advancement of the IoT—including its subset the Industrial Internet of Things (IIoT)—has given way to the latest industrial revolution:...