Wi-Fi 6 (or 802.11ax) is the latest generation of Wi-Fi, although Wi-Fi 7 is hot on its heels. Wi-Fi 6 offers faster speeds, increased throughput,…
Securing Modbus Communications: Modbus TLS and Beyond
Modbus is a communications protocol developed in 1979 by Modicon to transmit messages between industrial control and monitoring devices. Modbus is a freely available open…
Can Blockchain Combat Increasing Cyberattacks?
Blockchain has many applications beyond bitcoin. With the recent rise in cyberattacks, eyes have turned to blockchain as a possible cybersecurity solution. What is Blockchain?…
Securing IoT Part V: Artificial Intelligence
Artificial intelligence is a powerful data analytics tool that unfortunately aids cybercriminals as well as cybersecurity personnel. AI in Cyberattacks AI assists cybercriminals in planning…
Securing IoT Part IV: Humans
Human error is the greatest security risk to IoT, often due to oversight or a lack of knowledge. The shift to remote working due to…
Endpoint Security Platforms: EPP and EDR
An endpoint is any computing device attached to an Internet-connected network, like computers, mobile devices, printers, routers or sensors. Over 70% of IT security breaches…
Securing IoT Part III: The Cloud
While cloud service providers are responsible for infrastructure security, it is the responsibility of individual companies to ensure data protection for stored information. McAfee outlines…
Securing IoT Part II: Security by Design for Devices
Security by design for IoT devices means envisioning security vulnerabilities at the concept stage of IoT device manufacturing. This allows for the strategic implementation of…
Securing IoT Part I: The Network
Threats to the IoT network are everywhere. To prevent attacks, common IoT security practices, networks and access points must be carefully and regularly evaluated. Why…