Threat Modeling for Critical Industrial Control Systems

Threat Modeling for Critical Industrial Control Systems

Industrial Control Systems (ICS) involve the devices, systems networks, controls and instrumentation that are involved in industrial process control. Entities that utilize ICS systems include power and electric utilities, telecommunications, oil and gas processing and...
Securing IoT Requires a Big-Picture View With Threat Modeling

Securing IoT Requires a Big-Picture View With Threat Modeling

Over the course of recent years, Internet of Things (IoT)-embedded technology has become more pervasive. IoT is finding its way into all of the major industries. From retail, to to critical infrastructure and everything in between, IoT devices are everywhere. They are...
Securing IoT Requires a Big-Picture View With Threat Modeling

Our Guide to IoT UART Security Protocols

A universal asynchronous receiver/transmitter (UART) is a hardware device with circuitry that facilitates communication between parallel and serial interfaces. These interfaces transmit data, as a single stream of bits, between two systems. Parallel and serial...