by John

Posted in Governance, IoT, IIoT, ICS-SCADA

by John

Posted in Blog

by John

Will you be attending RSA Conference in March? I will be leading a Peer to Peer session and Birds of a Feather on Industrial IoT Cybersecurity. Please join me!

P2P2-W15 Wed Mar 6 4:10pm – Moscone South 306 Read More

Posted in Presentations & Webinars Tagged with: , , ,

by John

Posted in Cybersecurity & Infosec, War & Terrorism

by John

Researchers have discovered a bevy of flaws in a consumer smart scale that could allow hackers to launch a variety of attacks, from man-in-the-middle to denial of service attacks. Checkmarx researchers reported the vulnerabilities on Monday and outlined four “medium” severity bugs linked to the connected scale. READ MORE

via ThreatPost

Posted in IoT, IIoT, ICS-SCADA

by John

Posted in IoT, IIoT, ICS-SCADA, Risk Management

by John

Posted in IoT, IIoT, ICS-SCADA, Nation State

by John

Posted in IoT, IIoT, ICS-SCADA