ICS security professionals should report ICS vulnerabilities to the vendor before attackers discover them and offer the vendor with remediation suggestions, mitigation measures, and security solutions to avoid network attack risks before the vulnerabilities are malicious exploited. Compared with Windows systems, a quite different method is used to assess ICS...
Blog
Enterprise Blockchain Security 2020-4
This chapter analyzes security threats facing enterprise blockchains. (mais…)
Annual IoT Security Report 2019-18
Introduction IoT devices are faced with a great security challenge and their security appears particularly important. On one hand, though IoT devices have had a long existence, legacy IoT devices and their application protocols contain a variety of vulnerabilities due to the ill-conceived security design. On the other hand, as...
Adobe Security Bulletins for January 2021 Security Updates
Overview On January 12, 2021, local time, Adobe officially released January's security updates to fix multiple vulnerabilities in its various products, including Adobe Bridge, Adobe Captivate, Adobe InCopy, Adobe Campaign, Classic,Adobe Animate, Adobe Illustrator, and Adobe Photoshop. For details about the security bulletins and advisories, visit the following link: https://helpx.adobe.com/security.html...
Enterprise Blockchain Security 2020-3
Current mainstream consortium blockchain platforms include Hyperledger, Quorum, and R3 Corda, which are described in detail in the following sections. (mais…)
Considerations for Making ICS Networks Comply with CMMC
1. Background In early 2020, the US Department of Defense (DOD) released the Cybersecurity Maturity Model Classification (CMMC). On average, the USA loses USD 600 billion a year to adversaries in the cyberspace. Currently, the DOD has about 300,000 contractors, covering a variety of fields from hypersonic weapons to leather...




