STAY COOL WITH M2M

| March 1, 2016

article image
Most of the fish (and other food we buy at our local supermarket) have a long trip before they arrive to the shelf where you find it. Take hake or tuna fish for example. Maybe you find it on a shelf in a supermarket in Barcelona.

Spotlight

Tangible Security

Founded in 1998, Tangible develops and deploys cybersecurity solutions to protect our clients’ sensitive data, infrastructure, and competitive advantage. We have served our nation’s most security conscious government organizations with military grade requirements as well as corporate clients demanding more agile and affordable results. The value we deliver stems from the expertise of our people. They write industry-leading books, serve on classified government projects, and deliver presentations at major events on critical security practices. They are the architects, pioneers, and sustainers of systems that we can seldom discuss publicly. Our cybersecurity products and services span: public key infrastructure (PKI) authentication integration/operations; enterprise cybersecurity assessment & testing; enterprise security program development; Governance, Risk Management, & Compliance (GRC); embedded device cybersecurity assessments; and secure product development life cycle (SPDLC) ser

OTHER ARTICLES

Who should lead the push for IoT security?

Article | February 10, 2020

The ease with which internet of things devices can be compromised, coupled with the potentially extreme consequences of breaches, have prompted action from legislatures and regulators, but what group is best to decide? Both the makers of IoT devices and governments are aware of the security issues, but so far they haven’t come up with standardized ways to address them. The challenge of this market is that it’s moving so fast that no regulation is going to be able to keep pace with the devices that are being connected,” said Forrester vice president and research director Merritt Maxim. “Regulations that are definitive are easy to enforce and helpful, but they’ll quickly become outdated.”The latest such effort by a governmental body is a proposed regulation in the U.K. that would impose three major mandates on IoT device manufacturers that would address key security concerns.

Read More

OT/IoT Security Superheroes: Tackling the Remote Employee Challenge

Article | February 10, 2020

Organizations around the world are coping with a variety of challenges related to the COVID-19 outbreak. Many companies are struggling to convert their processes from ‘in-office’ to ‘remotely accessible’. And, they’re scrambling to find new ways to “remote” tasks – with “remote” now becoming a verb. For example, we’ve heard from many customers that adding or expanding remote employee access capabilities is a hot topic. One such customer told us that they went from 9% of their workforce working remotely, to 52%. Wow! That’s not only a substantial change to operations and processes – it also directly impacts the company’s security posture. The challenge facing OT security practitioners is daunting. We absolutely must secure the people and systems responsible for saving mankind from an alien super-virus pandemic. But, while the bad guys are lobbing attacks from afar, the good guys are acting behind the scenes like NPCs (non-player characters). They’re bypassing the security systems we developed through years of hard work, like using Gmail or Zoom, or turning off anti-virus, in the name of getting things done.

Read More

AI + IoT = Automating and Analyzing Data Collection

Article | February 10, 2020

IoT is huge, but AI has the potential to supercharge the technology even more. Gartner predicts that this year 80 percent of all enterprise IoT projects will include AI. One area where many have been critical of IoT is a lack of good security. When coupled with AI, that could be improved, but some worry that AI can also be used as a tool to defeat IoT security. Dean Chester, cybersecurity author, wrote that “AI can be used for IoT security, or it can be used against it.”Melvin Greer, Chief Data Scientist, Intel Americas , said that “AI and IoT are no longer in separate swim lanes. AI closes the loop in an IoT environment where IoT devices gather or create data, and AI helps automate important choices and actions based on that data. Today, most organizations using IoT are only at the first ‘visibility’ phase where they can start to see what’s going on through IoT assets. But they’re moving toward the reliability, efficiency and production phases, which are more sophisticated and require stronger AI capabilities.

Read More

Automotive Cyber Security: A Crash Course on Protecting Cars Against Hackers

Article | February 10, 2020

Modern cars have dozens of computers on board, and they’re not just for running GPS or playing music. Computers monitor and control nearly every system on your vehicle, including steering, brakes, and the engine itself. This is why automotive cyber security is essential. If a vehicle’s computer systems aren’t properly protected, hackers can steal data or even take control of the vehicle. As you can imagine, that makes automotive cyber security a major concern for consumers, auto companies, and OEMs alike. But what is there to know about automotive cyber security? We’ll explore what cybersecurity in the automotive industry entails and what the biggest threats are to automotive IoT and connected vehicles. We’ll also share some insights from a recent webinar by Sectigo and Mentor Graphics on how to protect connected vehicles from emerging cybersecurity threats.

Read More

Spotlight

Tangible Security

Founded in 1998, Tangible develops and deploys cybersecurity solutions to protect our clients’ sensitive data, infrastructure, and competitive advantage. We have served our nation’s most security conscious government organizations with military grade requirements as well as corporate clients demanding more agile and affordable results. The value we deliver stems from the expertise of our people. They write industry-leading books, serve on classified government projects, and deliver presentations at major events on critical security practices. They are the architects, pioneers, and sustainers of systems that we can seldom discuss publicly. Our cybersecurity products and services span: public key infrastructure (PKI) authentication integration/operations; enterprise cybersecurity assessment & testing; enterprise security program development; Governance, Risk Management, & Compliance (GRC); embedded device cybersecurity assessments; and secure product development life cycle (SPDLC) ser

Events