Trending Cyber-Kinetic Security & Cybersecurity Posts

    All Cyber-Kinetic Security & Cybersecurity Posts

    • 5G SecurityIoT Cybersecurity Framework Government

      5G Making It More Important for Governments to Lead IoT Security

      The human brain is programmed to keep us safe and secure. Yes, we are separated from the rest of the animal kingdom by our advanced capacities of sense-making and decision-making, but at the core of our grey matter remains some primitive but powerful tech tasked with keeping us alive. If your amygdala senses danger, it makes a split second decision and triggers the fight-or-flight response,…

      Read More »
    • Cyber-Kinetic SecurityIEMI

      Intentional Electromagnetic Interference (IEMI) IoT Threat

      As IoT adoption continues to proliferate, manufactures and adopters are increasingly aware of cybersecurity risks to IoT. Yet, even among the IoT security professionals, one significant potential remote attack vector is often overlooked: intentional electromagnetic interference (IEMI). Electromagnetic interference (EMI) surrounds us – natural causes, such as solar flares and lightning; and man-made sources such as radio and TV broadcasting, radars, microwaves and many others…

      Read More »
    • Cyber-Kinetic SecurityCanada Critical Infrastructure

      Canadian Critical Infrastructure Cyber Protection

      Targeted cyberattacks against critical infrastructure (CI) are increasing on a global scale. Critical systems are rapidly being connected to the internet, affording attackers opportunities to target virtual systems that operate and monitor physical structures and physical processes through various modes of cyberattack. When people think of cyberattacks, their minds often go first to the financial sector. After all, that’s the type of attack people hear…

      Read More »
    • Post-Quantum IT OT Asset Discovery Challenges

      The Challenge of IT and OT Asset Discovery

      Every CISO understands the simple truth: you can’t protect what you don’t know you have. A comprehensive inventory of IT and OT assets - from servers and laptops to industrial controllers and IoT sensors - is the foundation of effective cybersecurity. In theory, building this asset inventory sounds straightforward. In practice, it’s one of the hardest tasks in cybersecurity today. Many enterprises find that even…

      Read More »
    • Cyber-Kinetic SecurityIoT Bomb Stuxnet

      Stuxnet: The Father of Cyber-Kinetic Weapons

      While Stuxnet is gone, the world now knows what can be accomplished through cyber-kinetic attacks. As we approach the 10th anniversary of when Stuxnet was (likely) deployed, it is worthwhile to examine the effect it still has on our world. As the world’s first-ever cyberweapon, it opened Pandora’s box. It was the first true cyber-kinetic weapon – and it changed military history and is changing…

      Read More »
    • Cyber-Kinetic SecurityCyber-Kinetic Railway

      Growing Cyber-Kinetic Vulnerabilities of Railway Systems

      In their growing efforts to increase efficiencies through digitization and automation, railways are becoming increasingly vulnerable to cyber-kinetic attacks as they move away from strictly mechanical systems and bespoke standalone systems to digital, open-platform, standardized equipment built using Commercial Off the Shelf (COTS) components. In addition, the increasing use of networked control and automation systems enable remote access of public and private networks. Finally, the…

      Read More »
    • Cyber-Kinetic SecurityIEMI

      IEMI – Threat of Intentional Electromagnetic Interference

      As our cities, our transportation, our energy and manufacturing – our everything – increasingly embrace Internet of Things (IoT) and Industrial Controls Systems (ICS), securing its underlying cyber-physical systems (CPS) grows ever more crucial. Yet, even among engineers and cybersecurity specialists, one potential attack trajectory is often overlooked: Intentional Electromagnetic Interference (IEMI). ICS and IoT – digital systems that run today’s modern society – rely…

      Read More »
    • Cyber-Kinetic SecurityCyber-Kinetic

      When Hackers Threaten your Life – Cyber-Kinetic Attacks Intro

      The attacker stepped out from behind a hedge in the upper-class suburban neighborhood, being careful to stay in the shadows. Across the street, the last lights shining through the windows of the house had just flickered out. She tugged the bottom of her black hoodie into place and pulled the hood up over her head, casting her face deeper in shadow. Her target sat in…

      Read More »