cybersecurity
A Secure Product Development Framework (SPDF) is a set of processes that help identify and reduce the number and severity of vulnerabilities in products. It encompasses all aspects of a product’s lifecycle, including design, development, release, support and decommission.Think of the SPDF as a…
BlogAccording to a 2022 FBI report, 53% of digital medical devices and other internet-connected products used in hospitals had known critical vulnerabilities caused by issues including unpatched and outdated software. In today’s world, where evolving cyber threats loom large – ransomware attacks alone…
BlogThe damage a hacker could achieve through compromising a connected home security system, a vehicle, printer, or even a medical device is immense. IoT devices can act as a “back door” to the network that hosts them, enabling a multitude of attacks. The stakes are high and protecting an always-on IoT…
BlogRansomware attacks — in which hackers break into private computer systems to encrypt and often steal files to hold for ransom — today are so prolific they’re considered a major national security issue. In 2020 alone, ransomware cost victims in the U.S. an estimated $1.4 billion. Sadly, there is no…
BlogA private network is where your business logic lives, including your data and your customer’s data in the form of servers, disks, databases. For this reason it is of utmost importance to secure your private network accordingly. This goal can be achieved using subnets, firewalls, private endpoints,…
BlogThe importance of encryption in today’s computing environments is self-evident. You can — and most often should — encrypt your data in the cloud. The goal of encryption, which turns data into an unintelligible scramble or cipher, is to prevent secrets from becoming known to unauthorized people and…
BlogIT disasters and attacks can be really expensive. Preparedness is the key to recovering with minimal (or none!) of the following: lost revenue, business disruption, damage to reputation, data loss and downtime. Developing an understanding of high availability, fault tolerance, recovery point…
BlogBusiness today is digital. Software-dependent. That means nearly every company is exposed to a growing number of potential vulnerabilities. Major system hacks — anxiety-inducing and costly to fix — regularly make the news. Hacker's preferred target: the application layer. Fortunately,…
BlogWith the expansive Equifax breach still making news, the focus on cybersecurity is again intense. At ICS, security is always top of mind as we aim to build — and help others build — connected devices that integrate substantial security features. In my last blog I framed the issue and offered a…
BlogNearly half of all companies in the US using an Internet of Things (IoT) network have been the victims of at least one security breach. Forty-eight percent. That’s according to a recent survey of 400 IT decision-makers across 19 industries conducted by strategy consulting group Altman Vilandrie…
Blog