Sustainable Cybersecurity for Industrial IoT

January 25, 2019

The nature of Internet of Things (IoT) devices and the scale of their use is what makes securing them so hard. IoT devices emerged for industrial controls two decades ago and then expanded rapidly into business and consumer technologies. The first IoT devices had important but limited capabilities. As embedded computing and networking technologies advanced, many tech trends – such as low power, miniaturization, massive increases in computer and memory chip density, digitalization, virtualization, and network capacity growth – turned small simple devices into intelligent high-powered networked computers. A perfect example is the rotary-dial analog telephone vs. the smartphone you carry with you.

Spotlight

CloudLock

CloudLock is the leading provider of cloud cybersecurity and CASB solutions, securing SaaS, PaaS, IaaS, and IDaaS environments and extends custom security services to homegrown applications, as well as ISV offerings. CloudLock enables enterprises such as Whirlpool, Seagate Technology, Costco, HBO, Ahold, BBVA and the Guardian to protect data in the cloud, reduce risk, achieve compliance, manage threats, and increase business productivity. CloudLock is the only security vendor combining U.S. and Israeli Military Intelligence with real-time, crowdsourced cloud security insight, continuously monitoring over one billion files daily across more than 10 million users. Security professionals feed into CloudLock’s security insight through peer-driven, crowdsourced Community Trust RatingsTM.

OTHER WHITEPAPERS
news image

Cyber security considerations 2022

whitePaper | September 12, 2022

The threat landscape is expanding. Cybercriminals are as entrepreneurial as ever and using increasingly sophisticated tools and technologies. In this fluid environment, we believe Chief Information Security Officers (CISOs) and their teams should adopt a mindset of enablement — cyber security is no longer just about prevention.

Read More
news image

CISA Stakeholder-Specific Vulnerability Categorization Guide

whitePaper | November 9, 2022

The CISA Stakeholder-Specific Vulnerability Categorization (SSVC) is a customized decision tree model that assists in prioritizing vulnerability response for the United States government (USG), state, local, tribal, and territorial (SLTT) governments; and critical infrastructure (CI) entities. This document serves as a guide for evaluating vulnerabilities using the CISA SSVC decision tree. The goal of SSVC is to assist in prioritizing the remediation of a vulnerability basedon the impact exploitation would have to the particular organization(s).

Read More
news image

MEC security; Status of standards support and future evolutions

whitePaper | September 28, 2022

The present White Paper will focus on MEC (Multi-access Edge Computing) technologies and intends to explore security-related use cases and requirements with the aim of identifying aspects of security where the nature of edge computing results in insufficient industry approaches to cloud security. Edge computing environments are by nature characterized by a complex multi-vendor, multi-supplier, multi-stakeholder ecosystem of equipment including both HW and SW devices. Given this overall level of system heterogeneity, the areas of security, trust, and privacy are key topics for the edge environments. Finally, the advent of edge cloud federations and the presence of (far) edge devices, e.g., in Internet-ofThings environments, requires tackling MEC security with an end-to-end (E2E) approach by leveraging existing standards relevant in the area, as carefully selected to be applicable in edge computing systems.

Read More
news image

The Trellix Approach to Effective Cloud Security

whitePaper | October 27, 2022

In many ways, the cloud1 is more secure than a traditional data center. Asset management, inventory, audit logging, two-factor access controls, connectivity redundancy and firewalls are built into the cloud provider platform. Servers are easier to patch and won’t become outdated within a few years; there aren’t any forgotten boxes sitting in a dark corner with a note reading, “DO NOT TURN OFF.” However, assets on the cloud continue to be compromised, just as those stored in traditional data centers.

Read More
news image

Asana Security and Privacy

whitePaper | October 26, 2022

Customers trust Asana with their data so that they can focus on the work that matters most to their businesses. That’s why we’re focused not only on creating an easy to-use collaborative work management solution, but also on keeping our customers’ data safe.

Read More
news image

Cloud-native security practicesin IBM Cloud

whitePaper | December 15, 2019

IBM Cloud™ is IBM’s high-performing public cloud platform, with data centers around the world that deliver cloud computing options from infrastructure as a service (IaaS), platform as a service (PaaS) to software as a service (SaaS). Security is a fundamental design principle for our cloud platform with market-leading security capabilities enabled for regulatory workloads.

Read More

Spotlight

CloudLock

CloudLock is the leading provider of cloud cybersecurity and CASB solutions, securing SaaS, PaaS, IaaS, and IDaaS environments and extends custom security services to homegrown applications, as well as ISV offerings. CloudLock enables enterprises such as Whirlpool, Seagate Technology, Costco, HBO, Ahold, BBVA and the Guardian to protect data in the cloud, reduce risk, achieve compliance, manage threats, and increase business productivity. CloudLock is the only security vendor combining U.S. and Israeli Military Intelligence with real-time, crowdsourced cloud security insight, continuously monitoring over one billion files daily across more than 10 million users. Security professionals feed into CloudLock’s security insight through peer-driven, crowdsourced Community Trust RatingsTM.

Events