Even if you’re not in the utility industry, it’s hard to ignore the slow march forward of the smart meter. The days of a utility employee stopping by to check the meter are well on their way out. In fact, it’s hard to imagine a system that relies on someone physically showing up to check […]… Read More
The post Using Smart Meters as a Digital Attack Vector appeared first on The State of Security.
from Using Smart Meters as a Digital Attack Vector
In January 2017, Tripwire completed a survey of 403 IT Security professionals about the most common attack types and how prepared organizations are to defend against them. You can read about the details here. There are two important conclusions from the research that I have to share for the purposes of this post. First, the […]… Read More
The post Foundational Controls for Common Attack Types appeared first on The State of Security.
from Foundational Controls for Common Attack Types
Near the bleeding edge of technology, there’s a lot of talk (and work) around DevOps and the use of containers for delivering services. This is a fast-paced environment where services are spun up and down to meet demand in an elastic cloud and code is shipped to production multiple times a day. It’s also an […]… Read More
The post Common Solutions for DevOps and Discrete Manufacturing appeared first on The State of Security.
from Common Solutions for DevOps and Discrete Manufacturing
What is it, when is it coming, and what steps should you take to comply? If you’ve been following the information security news or Twitter feeds, then you’ve no doubt seen the increase in traffic around the General Data Protection Regulation (GDPR). And there’s a good chance you’ve been ignoring it, as well. It’s time […]… Read More
The post A Primer on GDPR: What You Should Know appeared first on The State of Security.
from A Primer on GDPR: What You Should Know