Remove 2016 Remove Authorization Remove Malware Remove Security
article thumbnail

Guest Post: Cybersecurity Incidents Lead to New Standards, Requirements

Security Industry Association

Virtually no security manufacturers are exempt from the perils of cybercrime. Because the traditional security industry relies on a multitiered model where many products go from manufacturer to distributor to security integrator to end user, manufacturers often are unaware of the final destinations of – and applications for – their products.

article thumbnail

Beware of the self-wiggling mouse – Water industry & Cyber

Plan B Consulting

The biggest security threat was someone stealing a laptop and then using it to cause chaos within the system. All the operational advantages of control command of a telemetry system remain, but they now constitute a massive security risk. Very different threat landscape Roll forward 25 years and the threat landscape is very different.

article thumbnail

Beware of the self-wiggling mouse – Water industry & Cyber

Plan B Consulting

The biggest security threat was someone stealing a laptop and then using it to cause chaos within the system. All the operational advantages of control command of a telemetry system remain, but they now constitute a massive security risk. Hacking not considered an issue. Roll forward 25 years and the threat landscape is very different.