article thumbnail

Guest Opinion: How Modern Warfare Can Target Vulnerable IIoT Devices

Security Industry Association

i-PRO Americas’ Will Knehr shares tips for securing industrial Internet of Things devices. Hacktivist groups have specifically targeted SCADA, ICS systems and other potentially vulnerable systems to cause disruptions to critical infrastructure.

article thumbnail

What We Can Learn from the Log4j Vulnerability

Pure Storage

In December, a critical zero-day vulnerability was reported in the widely used Log4j framework. Log4j is so ubiquitous, in fact, that Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly called this “the most serious vulnerability I have seen in my decades-long career.”. And that’s the key to the vulnerability.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Prolonged, wide-area electrical power failure

Emergency Planning

lifts [elevators] blocked: people possibly trapped in them trains stranded: people possibly stranded in them traffic control inoperable: possibility of accidents and queues at road junctions critical facilities (hospitals, police stations, etc.)

article thumbnail

How AI Can Transform Integrated Security

Security Industry Association

Since the invention of the internet, there has not been a new technology that has captivated its audience as quickly as AI. Threat Detection and Mitigation When it comes to detecting threats, AI supports security efforts by analyzing patterns and identifying unusual activities that may lead to potential problems.

article thumbnail

Are Your IoT Devices Leaving the Door Open for Hackers?

NexusTek

Harnessing the global connectivity we now take for granted, the internet of things (IoT) has taken the world by storm, with a multitude of smart gadgets that feed our insatiable hunger for convenience, pique our curiosity about the leading edge of tech, and dazzle us, honestly, just by being plain “cool.”

article thumbnail

How to Counter AI-Driven Cybersecurity Threats to Physical Security Products

Security Industry Association

Zero-day attacks : Zero-day attacks are attacks that exploit vulnerabilities in software that the vendor is not aware of. AI can be used to automate the discovery and exploitation of zero-day vulnerabilities. Software updates often include security patches that can fix vulnerabilities that could be exploited by attackers.

article thumbnail

How do you defend your business against watering hole attacks?

Online Computers

This can reveal the victims’ interests and activities, such as if they’re involved in activism or charity works, or if they actively participate in political message boards. If such permissions are granted, they can make your network more vulnerable to attack. Leave us a message to learn more.

Malware 52