article thumbnail

Guest Opinion: How Modern Warfare Can Target Vulnerable IIoT Devices

Security Industry Association

i-PRO Americas’ Will Knehr shares tips for securing industrial Internet of Things devices. Hacktivist groups have specifically targeted SCADA, ICS systems and other potentially vulnerable systems to cause disruptions to critical infrastructure.

article thumbnail

What We Can Learn from the Log4j Vulnerability

Pure Storage

In December, a critical zero-day vulnerability was reported in the widely used Log4j framework. Log4j is so ubiquitous, in fact, that Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly called this “the most serious vulnerability I have seen in my decades-long career.”. And that’s the key to the vulnerability.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Retro Revolution:  Why Manual Workarounds  Are a BC Must 

BCM METRICS

Because technology is vulnerable to disruption—and disruptions are on the rise—every organization should devise manual workarounds for its critical business processes. The scenario was, “A regional internet outage has occurred; you have no internet access to the outside […].

article thumbnail

Prolonged, wide-area electrical power failure

Emergency Planning

lifts [elevators] blocked: people possibly trapped in them trains stranded: people possibly stranded in them traffic control inoperable: possibility of accidents and queues at road junctions critical facilities (hospitals, police stations, etc.)

article thumbnail

What Is The Future of Business Continuity

Business Continuity Today

Likewise, their vulnerabilities have changed. For example, disruptive technologies such as AI, the Internet of Things, and hyper-extended supply chains have created operational complexity where vulnerabilities are hard to detect and even harder to protect. Likewise, their vulnerabilities have changed.

article thumbnail

The Industrial Revolution v4.1: with increased opportunity comes increased vulnerability

SRM

But arguably we are now entering an additional phase which includes the integration of physical devices, vehicles, home appliances embedded with electronics, software, sensors, actuators and connectivity, sometimes known as The Internet of Things. also brings an increased level of vulnerability. This is the Industrial Revolution v4.1.

article thumbnail

Announcing General Availability of Citrix App Delivery and Security Service

Citrix

Today I am excited to announce general availability of the Citrix App Delivery and Security Service (CADS Service) the industry’s first intent-based, continuously optimizing, self-healing, internet-aware application delivery service.