I get accused of focusing too much on 5G as the only future IoT connectivity option. I do write a lot about how 5G...
As IoT adoption continues to proliferate, manufactures and adopters are increasingly aware of cybersecurity risks to IoT. Yet, even among the IoT security professionals,...
Not even 30 years separate us from the end of the Cold War. Yet, we appear to be witnessing the emergence of a new...
Because it demands so much manpower, cybersecurity has already benefited from AI and automation to improve threat prevention, detection and response. Preventing spam and identifying malware are already common examples. However, AI is also being used – and will be used more and more – by cybercriminals to circumvent cyberdefenses and bypass security algorithms. AI-driven cyberattacks have the potential to be faster, wider spread and less costly to implement. They can be scaled up in ways that have not been possible in even the most well-coordinated hacking campaigns. These attacks evolve in real time, achieving high impact rates.
China and Russia share an information security doctrine, one that is significantly different from Euro-Atlantic doctrines. In the Chino-Russian model of information space a...
In their growing efforts to increase efficiencies through digitization and automation, railways are becoming increasingly vulnerable to cyber-kinetic attacks as they move away from...
Our physical world is becoming more connected – which makes it more dependent on the cyber world. Many physical objects around us are no...
“Cyber war” is a term that is in recent days used so liberally that people may often wonder if these words are as menacing...
The human brain is programmed to keep us safe and secure. Yes, we are separated from the rest of the animal kingdom by our...
There is a new danger lurking in the information assets of countless organizations around the globe disguised by a plan devised to protect a...
Stuxnet was the first true cyber-kinetic weapon, designed to cripple the Iranian – and perhaps also the North Korean – nuclear weapon programs. It...
Cybersecurity strategies need to change in order to address the new issues that Machine Learning (ML) and Artificial Intelligence (AI) bring into the equation. Although those issues have not yet reached crisis stage, signs are clear that they will need to be addressed – and soon – if cyberattackers are to be prevented from obtaining a decided advantage in the continuing arms race between hackers and those who keep organizations’ systems secure.
While Stuxnet is gone, the world now knows what can be accomplished through cyber-kinetic attacks.
As we approach the 10th anniversary of when Stuxnet was...
Last week, the Saudi Data and Artificial Intelligence Authority (SDAIA) launched a nationwide awareness campaign called “Ask Before”, intended to educate the public about the significance...
Targeted cyberattacks against critical infrastructure (CI) are increasing on a global scale. Critical systems are rapidly being connected to the internet, affording attackers opportunities...