Blog
The Growing Need for Emerging Technology Solutions in Industrial Cybersecurity
May 3, 2023
0 Comment
By Philip Marshall
Historically, industrial cybersecurity in automation systems has concentrated on controller-tocontroller communications and using dedicated IT/OT gateways, with systems segmented into interconnected zones. Today, integrators are primarily applying cybersecurity to the interfaces of these zones. These segments typically include operations technology (OT) industrial networks, and their device intercommunications are generally unprotected.
By Mike Quinn
Despite business leaders’ growing awareness of cybercrime—and the rapid adaptations offered by new cybersecurity architectures—criminals continue to successfully exploit weaknesses created by these evolving business infrastructures. As a disclosure, my company Active Cypher is one provider of cybersecurity solutions. The problem? The technology industry has long been building walls around
By Zaveria
Learn about the benefits and challenges of data analytics in cybersecurity in this guide The generation and storage of ever-increasing volumes of data by organizations have made cybersecurity a top priority for companies of all kinds. Because big data analytics is now a crucial tool for detecting and preventing cyberattacks
By Morey Haber
Businesses and the general public alike should be wary of charging mobile devices in public venues. The Federal Bureau of Investigation (FBI) and the Federal Communications Commission (FCC) just updated their guidance on the risks of using public USB charging stations to recharge mobile devices. The concern is a cyber-theft tactic called “juice jacking.”
It’s time to harden AI and ML for cybersecurity
April 29, 2023
0 Comment
By Kyle Johnson,
AI and machine learning are hot topics in the technology industry, especially as ChatGPT and other generative AI take over headlines. So, it’s no surprise AI and ML were featured heavily at RSA Conference 2023. One session, “Hardening AI/ML Systems — The Next Frontier of Cybersecurity,” featured a panel discussion about