IoT Cybersecurity vision 2018-2019

November 6, 2019

The emergence of IoT – the networked connection of people, process, data and things – is expected to significantly grow the number of connected devices worldwide, from billions of units we have today, to tens of billions of units expected to be deployed in the coming years as stated by several analysts.

Spotlight

RangeForce

RangeForce provides cloud-based cybersecurity training that emulates real-life cybersecurity attacks in a complex enterprise systems landscape. In 2014 alone, over 140 million cyber attacks resulted in security breaches. Even though more than 70% of these attacks exploit known system vulnerabilities, most cyber security training is still deeply grounded in theory and fails to equip trainees with needed practical skills to protect the environments for which they are responsible. RangeForce training offering includes on-line training, customized training and cybersecurity competitions. Our training offering requires participants to assess and optimize responses to dynamic attacks in order to protect the simulated environment. RangeForce engages trainees on its gamified, hands on platform and provides them with a robust framework for developing practical, first line of defense, cybersecurity skills.

OTHER WHITEPAPERS
news image

INDUSTRIAL CYBER RISK MANAGEMENT

whitePaper | May 21, 2021

Critical infrastructure owners and operators have managed industrial risk for hundreds of years. This risk is usually measured in impact to health, safety, and reliability. As these industrial systems become increasingly digitized, so does the risk. What were once seen as isolated, manual processes have become reliant on communication networks and digital devices.

Read More
news image

Warring State - China's cybersecurity strategy

whitePaper | December 1, 2019

Cyberspace and information technology have enabled the economic, political, and cultural inte - gration of the United States and China. However, interdependence creates costs as well as benefits. Increased interconnection has also contributed to major obstacles in the bilateral relationship, generating mutual distrust of incentives, actions, and norms in cyberspace. Information technology raises new challenges for states by allowing actors to exploit networks, conduct cyber espionage, or compromise national security with greater ease.

Read More
news image

Cyber Security After the Pandemic

whitePaper | April 29, 2021

The cyber security industry has faced two major sets of challenges over the last twelve months. The attacks and exploits affecting Solar Winds, Accellion, Microsoft and their customers have focused attention on supply chain risk, but the impact of the coronavirus pandemic has been felt more broadly across cyber security domains and disciplines.

Read More
news image

DeltaV SIS™ and Cybersecurity

whitePaper | November 28, 2019

Safety Instrumented Systems (SIS) are designed to keep processes safe, especially during critical situations. With this concept in mind, it is paramount that the SIS components are not taken down due to cyber-threats. The purpose of this white paper is to explain, in detail, the Emerson approach for cybersecurity as well as the built-in security features available within the DeltaV SIS process safety system.

Read More
news image

Security Operations Maturity Model

whitePaper | February 20, 2020

As the threat landscape continues to evolve, your cybersecurity efforts must follow suit. With your security operations center (SOC) at the core of your offense against threats, you must ensure that it can handle anything that comes its way. To be effective, you need to mature your SOC to stop threats early — before damage occurs. Whether your SOC is a virtual team of two to three or a 24x7 operation, maturing your security operations capabilities will help you achieve a faster mean time to detect (MTTD) and mean time to respond (MTTR) to cyberthreats. This white paper explores LogRhythm’s Security Operations Maturity Model (SOMM), which explains how to measure the effectiveness of your security operations. Through the model, you can learn how to mature your security operations capabilities, improving your resilience to cyberthreats.

Read More
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More

Spotlight

RangeForce

RangeForce provides cloud-based cybersecurity training that emulates real-life cybersecurity attacks in a complex enterprise systems landscape. In 2014 alone, over 140 million cyber attacks resulted in security breaches. Even though more than 70% of these attacks exploit known system vulnerabilities, most cyber security training is still deeply grounded in theory and fails to equip trainees with needed practical skills to protect the environments for which they are responsible. RangeForce training offering includes on-line training, customized training and cybersecurity competitions. Our training offering requires participants to assess and optimize responses to dynamic attacks in order to protect the simulated environment. RangeForce engages trainees on its gamified, hands on platform and provides them with a robust framework for developing practical, first line of defense, cybersecurity skills.

Events