article thumbnail

Guest Opinion: How Modern Warfare Can Target Vulnerable IIoT Devices

Security Industry Association

i-PRO Americas’ Will Knehr shares tips for securing industrial Internet of Things devices. October is Cybersecurity Awareness Month , and the Security Industry Association (SIA) Cybersecurity Advisory Board is marking the occasion with a series of helpful content, tips and guidance on key cybersecurity topics.

article thumbnail

What We Can Learn from the Log4j Vulnerability

Pure Storage

In December, a critical zero-day vulnerability was reported in the widely used Log4j framework. Log4j is so ubiquitous, in fact, that Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly called this “the most serious vulnerability I have seen in my decades-long career.”. What Is the Log4j Vulnerability?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How AI Can Transform Integrated Security

Security Industry Association

The potential is great, though challenges remain James Segil is the vice president of marketing and inside sales, video security and access control at Motorola Solutions. The physical and cybersecurity world is dynamic and fast-paced, with security experts constantly looking for ways to automate, optimize and enhance their security efforts.

article thumbnail

Announcing General Availability of Citrix App Delivery and Security Service

Citrix

Today I am excited to announce general availability of the Citrix App Delivery and Security Service (CADS Service) the industry’s first intent-based, continuously optimizing, self-healing, internet-aware application delivery service.

article thumbnail

How to Counter AI-Driven Cybersecurity Threats to Physical Security Products

Security Industry Association

October is Cybersecurity Awareness Month , and the Security Industry Association (SIA) Cybersecurity Advisory Board is marking the occasion with a series of helpful content, tips and guidance on key cybersecurity topics. Zero-day attacks : Zero-day attacks are attacks that exploit vulnerabilities in software that the vendor is not aware of.

article thumbnail

ISC East Session Preview: Securing IIoT Using Zero Trust — The Future of IIoT Cybersecurity

Security Industry Association

15-17 in New York City, and the Security Industry Association (SIA) and ISC East recently revealed full conference details for the SIA Education@ISC East program , including keynote presentations from top luminaries and over 30 sessions from top industry expert speakers on the most current business trends, technologies and industry developments.

article thumbnail

The top causes of network security breaches in 2023

Online Computers

Network security breaches have been and will continue to be a major problem for businesses. In this blog post, we will outline the top reasons for network security breaches that will be most prevalent in 2023. While cloud providers already take measures on their end , businesses must also do their part to secure cloud data.