Finding a vulnerability, developing an exploit, and then launching (or not launching) this exploit – is repeated many times every day. Now more than ever companies must be aware of two perspectives: what a system is intended to do, and what a system can do. The term...
On an almost weekly basis, another organization or government agency owns up to having been “hacked” – admitting that its systems have been breached. For every company that discloses an issue, there are likely 20 – 30 more that keep it under wraps. We know this...
As the automotive industry adds more software and connections into vehicles, it simultaneously increases the probability of cyberattacks due to vulnerabilities. Right now, the average car has about 100 million lines of software code and 100 electronic control unit...
One of the main reasons cyber risk continues to increase exponentially is due to the rapid expansion of attack surfaces – the places where software programs are vulnerable to attack or probe by an adversary. Attack surfaces, according to the SANS Institute, can...
Today’s industrial infrastructure is stronger and smarter than ever before. As manufacturers seek greater scalability and efficiency, they’ve automated and digitized their machines to achieve unprecedented power. But these “super” machines have a critical weakness –...
Supply chain attacks Symantec’s new “Internet Security Threat Report,” shows a 200% increase in reported supply chain cyberattacks year on year.1 A supply chain attack seeks to damage an organization by targeting vulnerable elements in its global supply network. For...