

Chris Grove
Product Evangelist /*=$expert->feature_status*/ ?>
Nozomi Networks
Comments Dotted :
4
December 09, 2020
These findings join a long trail of similar high-impact security discoveries in embedded and IoT devices.
These findings join a long trail of similar high-impact security discoveries in embedded and IoT devices. As more and more embedded devices are used in things like building management systems, cameras, routers, sensors, locks, lights, scanners, robots, motors, and hundreds of other devices, the problem will become more prevalent. There is no slowing down on the volume or variety of embedded devices being manufactured and deployed. For the most part, not much has changed at the manufacturer.....Read More

October 04, 2020
Hardening the target is also an important part of reducing the impact of the discovered flaws.
The flaws recently discovered by security researchers underscore the importance of independently monitoring ICS systems. Products that provide remote access, VPN connectivity, firewalling, etc are prone to the same issues any technology faces, which is staying ahead of the attackers and being as cyber resilient as possible. However, sometimes there can be a window of opportunity for the attackers while systems get patched, and mitigations put into place.
Furthermore, if there are combined.....Read More

April 16, 2020
There must be recourse, or due process, in assessing the data or conclusions made from the data.
The use of surveillance tools may seem like a huge privacy issue, yet there are a few guidelines that, if followed correctly, can help the world combat COVID-19. First, the intrusions into our privacy must have a direct positive impact on fighting the virus, and the intrusions must be proportionate to the benefit. Data collected has to be based on science, and must be the minimum amount of data required, and not have bias built into the collection model or methods. The data life cycle needs to.....Read More

March 03, 2020
Its role isn’t too hack or defraud directly, but serve as proof someone was hacked, and is in a position of subsequent vulnerability.
Attack methods like DoppelPaymer can prove highly effective because it is not about the type or sensitivity of the data, but the power of the adversary possessing and being able to expose it. Exposed data from a plant would be just as effective at influencing the victim to pay up as data from HQ. Its role isn’t too hack or defraud directly, but serve as proof someone was hacked, and is in a position of subsequent vulnerability.
Once you consider that ransomware doesn’t discriminate –.....Read More
