DoD weapon systems remain vulnerable to cyber attack. It’s not clear which ones will actually be able to perform when needed. The VxWorks/URGENT 11 vulnerabilities offer another example. VxWorks is a real-time operating system (RTOS) used in embedded systems. It is...
Securing a large complex enterprise network is a challenging, never-ending process. The move to cloud has intensified the problem. Often, there is nothing to protect an IT system when a breach makes it past perimeter defenses. Moreover, memory corruption bugs are...
Organizations often perceive cybersecurity as a necessary evil. They know that it’s critical to protect business assets but it’s seldom seen as a driver that helps move the business forward. It’s a checkbox, a requirement that is begrudgingly addressed to reduce risk...
This post was originally written by IoT analyst Scott Shagory and appears on his website. RunSafe Security is a cybersecurity startup and Mach37 graduate focused on providing security solutions to firms and agencies in the domain areas of national security, critical...
This article originally appeared in OILMAN Magazine. Like all sectors of critical infrastructure, the oil and gas (O&G) industry has emerged as a top target for cyberattack, yet most companies are not doing nearly enough to mitigate the risks. Demand for business...
This article originally appeared in OILMAN Magazine. Like all sectors of critical infrastructure, the oil and gas (O&G) industry has emerged as a top target for cyberattack, yet most companies are not doing nearly enough to mitigate the risks. Demand for business...