{"id":1354184,"date":"2017-07-02T13:43:25","date_gmt":"2017-07-02T19:43:25","guid":{"rendered":"http:\/\/secblvd.wpengine.com\/?page_id=1354184"},"modified":"2018-01-11T02:08:24","modified_gmt":"2018-01-11T07:08:24","slug":"iot-ics-security","status":"publish","type":"page","link":"https:\/\/securityboulevard.com\/iot-ics-security\/","title":{"rendered":"IoT and ICS Security"},"content":{"rendered":"<div id=\"pl-1354184\"  class=\"panel-layout\" ><div id=\"pg-1354184-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-1354184-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1354184-0-0-0\" class=\"so-panel widget_text panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-1354184-0-0-0\" >\t\t\t<div class=\"textwidget\"><h1>IOT and ICS Security<\/h1>\n<\/div>\n\t\t<\/div><\/div><div id=\"panel-1354184-0-0-1\" class=\"widget_text so-panel widget_custom_html\" data-index=\"1\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-scrollable pt-cv-colsys pt-cv-reused\" id=\"pt-cv-view-2f53dd3mdc\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div id=\"7ed5892ds3\" class=\"pt-cv-carousel pt-cv-slide\" data-ride=\"cvcarousel\" data-interval=10000>\n<div class=\"carousel-inner\"><div class=\"item active\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037597\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash.png\" class=\"pt-cv-thumbnail img-none\" alt=\"Three tiny people cleaning the inside of a hard drive\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >QNAP\u2019s Buggy Security Fix Causes Chaos<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T09:54:57-05:00\">5 days ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037237\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw.png\" class=\"pt-cv-thumbnail img-none\" alt=\"A D-Link DSR-250N, which is now EOL\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >Here\u2019s Yet Another D-Link RCE That Won\u2019t be Fixed<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-21T12:33:40-05:00\">1 week ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2036204\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-nas-wont-fix-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/sanitize-inputs-richixbw-xkcd-cc-by-nc.png\" class=\"pt-cv-thumbnail img-none\" alt=\"xkcd.com\/327 \u2014 \u201cExploits of a Mom\u201d\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/sanitize-inputs-richixbw-xkcd-cc-by-nc.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/sanitize-inputs-richixbw-xkcd-cc-by-nc-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/sanitize-inputs-richixbw-xkcd-cc-by-nc-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-nas-wont-fix-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >These 20 D-Link Devices Have Critical RCE Bug \u2014 but NO Patch NEVER<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-13T12:22:08-05:00\">3 weeks ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div><\/div>\n<a class=\"left carousel-control\" data-target=\"#7ed5892ds3\" data-cvslide=\"prev\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-left\"><\/span>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<a class=\"right carousel-control\" data-target=\"#7ed5892ds3\" data-cvslide=\"next\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-right\"><\/span>\r\n\t\t\t\t\t<\/a><\/div><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-5fac64d5r1\">#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 40px !important; font-weight: 600 !important; line-height: 1.0 !important; }\n@media (min-width: 768px) and (max-width: 991px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 20px !important }}\n@media (max-width: 767px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 14px !important }}\n#pt-cv-view-2f53dd3mdc .pt-cv-carousel-caption  { background-color: rgba(51,51,51,.6) !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-meta-fields * { color: #ffffff !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore  { color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore:hover  { color: #ffffff !important; background-color: #00aeef !important; }<\/style>\r\n\t\t\t<\/div><\/div><div id=\"panel-1354184-0-0-2\" class=\"widget_text so-panel widget_custom_html panel-last-child\" data-index=\"2\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-pinterest pt-cv-colsys pt-cv-shadow pt-cv-no-bb pt-cv-pgloadmore pt-cv-reused\" id=\"pt-cv-view-63f1e1bp89\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037597\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Three tiny people cleaning the inside of a hard drive\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >QNAP\u2019s Buggy Security Fix Causes Chaos<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T09:54:57-05:00\">November 26, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/automatic-updates\/' title='automatic updates' class='pt-cv-tax-automatic-updates'>automatic updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/data-storage\/' title='data storage' class='pt-cv-tax-data-storage'>data storage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware\/' title='firmware' class='pt-cv-tax-firmware'>firmware<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-patch\/' title='firmware patch' class='pt-cv-tax-firmware-patch'>firmware patch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-security\/' title='firmware security' class='pt-cv-tax-firmware-security'>firmware security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-update\/' title='firmware update' class='pt-cv-tax-firmware-update'>firmware update<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-updates\/' title='Firmware Updates' class='pt-cv-tax-firmware-updates'>Firmware Updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hard-disk-drive\/' title='hard disk drive' class='pt-cv-tax-hard-disk-drive'>hard disk drive<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hard-drive\/' title='hard drive' class='pt-cv-tax-hard-drive'>hard drive<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/nas\/' title='NAS' class='pt-cv-tax-nas'>NAS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/os-security-updates\/' title='os security updates' class='pt-cv-tax-os-security-updates'>os security updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/qnap\/' title='QNAP' class='pt-cv-tax-qnap'>QNAP<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/qts\/' title='QTS' class='pt-cv-tax-qts'>QTS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/raid\/' title='RAID' class='pt-cv-tax-raid'>RAID<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/release-management\/' title='Release Management' class='pt-cv-tax-release-management'>Release Management<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/security-update\/' title='security update' class='pt-cv-tax-security-update'>security update<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/storage\/' title='storage' class='pt-cv-tax-storage'>storage<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">RAID FAIL: NAS Maker does a CrowdStrike\u2014cleanup on \/dev\/dsk\/c1t2d3s4 please ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037472\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/deepfake-fraud-data-brokers-tracking-military-personnel\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container cvp-block\" target=\"_self\" ><span class=\"cvp-play\"><\/span><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"cvp-videothumb skip-lazy  cvplazy\" alt=\"Digital Privateers: How Deepfakes and Data Brokers Threaten Privacy\" data-cvpsrc=\"https:\/\/i.ytimg.com\/vi\/VyttgAKIadI\/hqdefault.jpg\" \/><iframe title=\"Digital Privateers: How Deepfakes and Data Brokers Threaten Privacy\" width=\"290\" height=\"163\" data-skip-lazy data-no-lazy class=\"cvp-videothumb\" data-cvpsrc=\"https:\/\/www.youtube.com\/embed\/VyttgAKIadI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/deepfake-fraud-data-brokers-tracking-military-personnel\/\" class=\"_self cvplbd\" target=\"_self\" >Deepfake Fraud, Data Brokers Tracking Military Personnel<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/tom-eston\/\" rel=\"author\">Tom Eston<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T00:00:33-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/biometrics\/' title='biometrics' class='pt-cv-tax-biometrics'>biometrics<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cyber-security\/' title='Cyber Security' class='pt-cv-tax-cyber-security'>Cyber Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cyber-threat\/' title='cyber threat' class='pt-cv-tax-cyber-threat'>cyber threat<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cybersecurity\/' title='Cybersecurity' class='pt-cv-tax-cybersecurity'>Cybersecurity<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/data-brokers\/' title='Data Brokers' class='pt-cv-tax-data-brokers'>Data Brokers<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/data-privacy\/' title='Data Privacy' class='pt-cv-tax-data-privacy'>Data Privacy<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/deepfake\/' title='deepfake' class='pt-cv-tax-deepfake'>deepfake<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/deepfakes\/' title='deepfakes' class='pt-cv-tax-deepfakes'>deepfakes<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/digital-privacy\/' title='Digital Privacy' class='pt-cv-tax-digital-privacy'>Digital Privacy<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/episodes\/' title='Episodes' class='pt-cv-tax-episodes'>Episodes<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/fraud\/' title='Fraud' class='pt-cv-tax-fraud'>Fraud<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/germany\/' title='Germany' class='pt-cv-tax-germany'>Germany<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/information-security\/' title='Information Security' class='pt-cv-tax-information-security'>Information Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/infosec\/' title='Infosec' class='pt-cv-tax-infosec'>Infosec<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/location\/' title='Location' class='pt-cv-tax-location'>Location<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/location-data\/' title='location data' class='pt-cv-tax-location-data'>location data<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/military\/' title='military' class='pt-cv-tax-military'>military<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/pirates\/' title='pirates' class='pt-cv-tax-pirates'>pirates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/podcast\/' title='Podcast' class='pt-cv-tax-podcast'>Podcast<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/podcasts\/' title='Podcasts' class='pt-cv-tax-podcasts'>Podcasts<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/privacy\/' title='Privacy' class='pt-cv-tax-privacy'>Privacy<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/privateers\/' title='Privateers' class='pt-cv-tax-privateers'>Privateers<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/scams\/' title='Scams' class='pt-cv-tax-scams'>Scams<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/security\/' title='security' class='pt-cv-tax-security'>security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/strava\/' title='Strava' class='pt-cv-tax-strava'>Strava<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/surveillance\/' title='surveillance' class='pt-cv-tax-surveillance'>surveillance<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/technology\/' title='technology' class='pt-cv-tax-technology'>technology<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/weekly-edition\/' title='Weekly Edition' class='pt-cv-tax-weekly-edition'>Weekly Edition<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">In Episode 356, Tom and Kevin discuss the increasing role of deepfake technology in bypassing biometric checks, accounting for 24 percent of fraud attempts. The show covers identity fraud issues and explores ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Shared Security Podcast&feed_id=546&blog_url=https:\/\/sharedsecurity.net\/\">Shared Security Podcast<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037237\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"A D-Link DSR-250N, which is now EOL\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/d-link-eol-rce-0day-richixbw-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-router-critical-rce-sol-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >Here\u2019s Yet Another D-Link RCE That Won\u2019t be Fixed<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-21T12:33:40-05:00\">November 21, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/d-link\/' title='D-Link' class='pt-cv-tax-d-link'>D-Link<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-corporation\/' title='D-Link Corporation' class='pt-cv-tax-d-link-corporation'>D-Link Corporation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-vulnerability\/' title='D-Link vulnerability' class='pt-cv-tax-d-link-vulnerability'>D-Link vulnerability<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-zero-day\/' title='D-Link zero day' class='pt-cv-tax-d-link-zero-day'>D-Link zero day<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things\/' title='Internet of things' class='pt-cv-tax-internet-of-things'>Internet of things<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-iot\/' title='Internet of Things (IoT)' class='pt-cv-tax-internet-of-things-iot'>Internet of Things (IoT)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-iot-security\/' title='Internet of Things (IoT) Security' class='pt-cv-tax-internet-of-things-iot-security'>Internet of Things (IoT) Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-cyber-security\/' title='Internet of Things cyber security' class='pt-cv-tax-internet-of-things-cyber-security'>Internet of Things cyber security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/iot\/' title='iot' class='pt-cv-tax-iot'>iot<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">D-Licious: Stubborn network device maker digs in heels and tells you to buy new gear ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2036204\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-nas-wont-fix-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"xkcd.com\/327 \u2014 \u201cExploits of a Mom\u201d\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/sanitize-inputs-richixbw-xkcd-cc-by-nc-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/d-link-nas-wont-fix-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >These 20 D-Link Devices Have Critical RCE Bug \u2014 but NO Patch NEVER<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-13T12:22:08-05:00\">November 13, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/cve-2024-10914\/' title='CVE-2024-10914' class='pt-cv-tax-cve-2024-10914'>CVE-2024-10914<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link\/' title='D-Link' class='pt-cv-tax-d-link'>D-Link<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-corporation\/' title='D-Link Corporation' class='pt-cv-tax-d-link-corporation'>D-Link Corporation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-nas-devices\/' title='D-Link NAS Devices' class='pt-cv-tax-d-link-nas-devices'>D-Link NAS Devices<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-vulnerability\/' title='D-Link vulnerability' class='pt-cv-tax-d-link-vulnerability'>D-Link vulnerability<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/d-link-zero-day\/' title='D-Link zero day' class='pt-cv-tax-d-link-zero-day'>D-Link zero day<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things\/' title='Internet of things' class='pt-cv-tax-internet-of-things'>Internet of things<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-iot\/' title='Internet of Things (IoT)' class='pt-cv-tax-internet-of-things-iot'>Internet of Things (IoT)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-iot-security\/' title='Internet of Things (IoT) Security' class='pt-cv-tax-internet-of-things-iot-security'>Internet of Things (IoT) Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/internet-of-things-cyber-security\/' title='Internet of Things cyber security' class='pt-cv-tax-internet-of-things-cyber-security'>Internet of Things cyber security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/iot\/' title='iot' class='pt-cv-tax-iot'>iot<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/nas\/' title='NAS' class='pt-cv-tax-nas'>NAS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/network-storage-device\/' title='network storage device' class='pt-cv-tax-network-storage-device'>network storage device<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">\u2018Bobby\u2019 flaw flagged WONTFIX: Company doesn\u2019t make storage devices now; has zero interest in fixing this catastrophic vulnerability ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2036096\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/protecting-critical-infrastructure-a-collaborative-approach-to-security-for-ics-ot-and-iiot\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Protecting Critical Infrastructure: A Collaborative Approach to Security for ICS, OT, and IIoT\" title=\"\" data-cvpsrc=\"https:\/\/www.guidepointsecurity.com\/wp-content\/uploads\/2021\/10\/iStock-1226866644_2000x675-150x150.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/protecting-critical-infrastructure-a-collaborative-approach-to-security-for-ics-ot-and-iiot\/\" class=\"_self cvplbd\" target=\"_self\" >Protecting Critical Infrastructure: A Collaborative Approach to Security for ICS, OT, and IIoT<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/christopher-warner\/\" rel=\"author\">Christopher Warner<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-12T09:00:00-05:00\">November 12, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/blog\/' title='Blog' class='pt-cv-tax-blog'>Blog<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ics\/' title='ICS' class='pt-cv-tax-ics'>ICS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/iot\/' title='iot' class='pt-cv-tax-iot'>iot<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ot-security\/' title='OT security' class='pt-cv-tax-ot-security'>OT security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ot-security-services\/' title='OT Security Services' class='pt-cv-tax-ot-security-services'>OT Security Services<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">In an era where cyber threats to critical infrastructure are growing in both sophistication and frequency, securing Operational Technology (OT), [\u2026] ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=The Guiding Point | GuidePoint Security&feed_id=901&blog_url=https:\/\/www.guidepointsecurity.com\/blog\/\">The Guiding Point | GuidePoint Security<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2035670\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-operation-shuts-down-22000-malicious-servers\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Interpol Operation Synergia ransomware phishing\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2020\/06\/police-matt-popovich-cc0-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/interpol-operation-shuts-down-22000-malicious-servers\/\" class=\"_self cvplbd\" target=\"_self\" >Interpol Operation Shuts Down 22,000 Malicious Servers<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-06T11:31:24-05:00\">November 6, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/interpol\/' title='Interpol' class='pt-cv-tax-interpol'>Interpol<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/law-enforcement-agencies\/' title='Law enforcement agencies' class='pt-cv-tax-law-enforcement-agencies'>Law enforcement agencies<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/phishing\/' title='Phishing' class='pt-cv-tax-phishing'>Phishing<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ransomware\/' title='Ransomware' class='pt-cv-tax-ransomware'>Ransomware<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Interpol, other law enforcement agencies, and cybersecurity firms teamed up for Operation Synergia II, shutting down 22,000 malicious servers that supported ransomware, phishing, and other attacks and arresting 41 people connected to ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2035048\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/leveraging-tabletop-exercises-to-enhance-ot-security-maturity\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Leveraging Tabletop exercises to Enhance OT security maturity\" title=\"\" data-cvpsrc=\"https:\/\/sectrio.com\/wp-content\/uploads\/2024\/11\/Leveraging-Tabletop-exercises-to-Enhance-OT-security-maturity-1024x538.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/leveraging-tabletop-exercises-to-enhance-ot-security-maturity\/\" class=\"_self cvplbd\" target=\"_self\" >Leveraging Tabletop exercises to Enhance OT security maturity<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/prayukth-k-v\/\" rel=\"author\">Prayukth K V<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-05T03:37:57-05:00\">November 5, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/ciso\/' title='CISO' class='pt-cv-tax-ciso'>CISO<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/incident-response\/' title='Incident Response' class='pt-cv-tax-incident-response'>Incident Response<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/iot\/' title='iot' class='pt-cv-tax-iot'>iot<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ot\/' title='OT' class='pt-cv-tax-ot'>OT<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/threats\/' title='threats' class='pt-cv-tax-threats'>threats<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Has your organization tested its OT security incident response plan in the last 6 months? Do you remember when you last checked your institutional OT security awareness levels? Are your OT security ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Sectrio&feed_id=846&blog_url=https:\/\/sectrio.com\">Sectrio<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034924\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/iot-security-failures-can-be-shtty\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/iot-security-failures-can-be-shtty\/\" class=\"_self cvplbd\" target=\"_self\" >IoT Security Failures Can Be Sh*tty<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/john-gallagher\/\" rel=\"author\">John Gallagher<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-01T19:56:27-04:00\">November 1, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/blog\/' title='Blog' class='pt-cv-tax-blog'>Blog<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cyber\/' title='cyber' class='pt-cv-tax-cyber'>cyber<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/iot\/' title='iot' class='pt-cv-tax-iot'>iot<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/remediation\/' title='remediation' class='pt-cv-tax-remediation'>remediation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sewage\/' title='sewage' class='pt-cv-tax-sewage'>sewage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/vulnerabilities\/' title='Vulnerabilities' class='pt-cv-tax-vulnerabilities'>Vulnerabilities<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">It\u2019s hard not to see IoT security failures in the news because they can be dramatic, and this week was no different.\u00a0 The Register reported that in Moscow a skyscraper-high plume of ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Viakoo, Inc&feed_id=979&blog_url=https:\/\/www.viakoo.com\/\">Viakoo, Inc<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034206\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/october-can-be-scary\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/october-can-be-scary\/\" class=\"_self cvplbd\" target=\"_self\" >October Can Be Scary<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/john-gallagher\/\" rel=\"author\">John Gallagher<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-23T19:50:53-04:00\">October 23, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/blog\/' title='Blog' class='pt-cv-tax-blog'>Blog<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/cyber\/' title='cyber' class='pt-cv-tax-cyber'>cyber<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/halloween\/' title='Halloween' class='pt-cv-tax-halloween'>Halloween<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/iot\/' title='iot' class='pt-cv-tax-iot'>iot<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ncsam\/' title='ncsam' class='pt-cv-tax-ncsam'>ncsam<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/remediation\/' title='remediation' class='pt-cv-tax-remediation'>remediation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/vulnerabilities\/' title='Vulnerabilities' class='pt-cv-tax-vulnerabilities'>Vulnerabilities<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Every October brings both Halloween and National Cybersecurity Awareness Month (NCSAM).\u00a0 Most people know about Halloween, but if you\u2019re just coming up to speed on NCSAM here is some background.\u00a0 National Cybersecurity ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Viakoo, Inc&feed_id=979&blog_url=https:\/\/www.viakoo.com\/\">Viakoo, Inc<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2034067\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/10\/how-to-evaluate-ot-security-program-maturity\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"How to evaluate OT security program maturity\" title=\"\" data-cvpsrc=\"https:\/\/sectrio.com\/wp-content\/uploads\/2024\/10\/How-to-evaluate-OT-security-program-maturity-1024x538.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/10\/how-to-evaluate-ot-security-program-maturity\/\" class=\"_self cvplbd\" target=\"_self\" >How to evaluate OT security program maturity<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/prayukth-k-v\/\" rel=\"author\">Prayukth K V<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-10-23T09:21:01-04:00\">October 23, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/ciso\/' title='CISO' class='pt-cv-tax-ciso'>CISO<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/incident-response\/' title='Incident Response' class='pt-cv-tax-incident-response'>Incident Response<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/iot\/' title='iot' class='pt-cv-tax-iot'>iot<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ot\/' title='OT' class='pt-cv-tax-ot'>OT<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/threats\/' title='threats' class='pt-cv-tax-threats'>threats<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">An OT security program can lead to better resource use, improved security operations, and tangible gains for the security posture of an OT operator. The benefits of running an OT security program ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Sectrio&feed_id=846&blog_url=https:\/\/sectrio.com\">Sectrio<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-center pt-cv-pagination-wrapper\"><a href='https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1354184\/?_page=2' onclick='event.preventDefault()' class=\"pt-cv-more btn btn-primary btn-sm\" data-totalpages=\"50\" data-nextpages=\"2\" data-sid=\"63f1e1bp89\" data-unid=\"070b6f8ba6f11f1b7b87cad6832216ab\" data-isblock=\"\" data-postid=\"\">Load more <span class=\"caret\"><\/span><\/a><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Loading...\" src=\"data:image\/gif;base64,R0lGODlhDwAPALMPAMrKygwMDJOTkz09PZWVla+vr3p6euTk5M7OzuXl5TMzMwAAAJmZmWZmZszMzP\/\/\/yH\/C05FVFNDQVBFMi4wAwEAAAAh+QQFCgAPACwAAAAADwAPAAAEQvDJaZaZOIcV8iQK8VRX4iTYoAwZ4iCYoAjZ4RxejhVNoT+mRGP4cyF4Pp0N98sBGIBMEMOotl6YZ3S61Bmbkm4mAgAh+QQFCgAPACwAAAAADQANAAAENPDJSRSZeA418itN8QiK8BiLITVsFiyBBIoYqnoewAD4xPw9iY4XLGYSjkQR4UAUD45DLwIAIfkEBQoADwAsAAAAAA8ACQAABC\/wyVlamTi3nSdgwFNdhEJgTJoNyoB9ISYoQmdjiZPcj7EYCAeCF1gEDo4Dz2eIAAAh+QQFCgAPACwCAAAADQANAAAEM\/DJBxiYeLKdX3IJZT1FU0iIg2RNKx3OkZVnZ98ToRD4MyiDnkAh6BkNC0MvsAj0kMpHBAAh+QQFCgAPACwGAAAACQAPAAAEMDC59KpFDll73HkAA2wVY5KgiK5b0RRoI6MuzG6EQqCDMlSGheEhUAgqgUUAFRySIgAh+QQFCgAPACwCAAIADQANAAAEM\/DJKZNLND\/kkKaHc3xk+QAMYDKsiaqmZCxGVjSFFCxB1vwy2oOgIDxuucxAMTAJFAJNBAAh+QQFCgAPACwAAAYADwAJAAAEMNAs86q1yaWwwv2Ig0jUZx3OYa4XoRAfwADXoAwfo1+CIjyFRuEho60aSNYlOPxEAAAh+QQFCgAPACwAAAIADQANAAAENPA9s4y8+IUVcqaWJ4qEQozSoAzoIyhCK2NFU2SJk0hNnyEOhKR2AzAAj4Pj4GE4W0bkJQIAOw==\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-18d5df2m0n\">#pt-cv-view-63f1e1bp89 .pt-cv-content-item { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-pinmas { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-title a, #pt-cv-view-63f1e1bp89  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 20px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89  .pt-cv-title a:hover, #pt-cv-view-63f1e1bp89  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-content , #pt-cv-view-63f1e1bp89  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-custom-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='63f1e1bp89'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination .active a, .pt-cv-pagination[data-sid='63f1e1bp89'] .active a { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>IOT and ICS Security<\/p>\n","protected":false},"author":6042,"featured_media":1354701,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1354184","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IoT and ICS Security - Security Boulevard<\/title>\n<meta name=\"description\" content=\"IOT and ICS Security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/iot-ics-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IoT and ICS Security\" \/>\n<meta property=\"og:description\" content=\"IOT and ICS Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/iot-ics-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:modified_time\" content=\"2018-01-11T07:08:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto48229897.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/iot-ics-security\/\",\"url\":\"https:\/\/securityboulevard.com\/iot-ics-security\/\",\"name\":\"IoT and ICS Security - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securityboulevard.com\/iot-ics-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securityboulevard.com\/iot-ics-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto48229897.jpg\",\"datePublished\":\"2017-07-02T19:43:25+00:00\",\"dateModified\":\"2018-01-11T07:08:24+00:00\",\"description\":\"IOT and ICS Security\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/iot-ics-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/iot-ics-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/iot-ics-security\/#primaryimage\",\"url\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto48229897.jpg\",\"contentUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto48229897.jpg\",\"width\":800,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/iot-ics-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IoT and ICS Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IoT and ICS Security - Security Boulevard","description":"IOT and ICS Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/iot-ics-security\/","og_locale":"en_US","og_type":"article","og_title":"IoT and ICS Security","og_description":"IOT and ICS Security","og_url":"https:\/\/securityboulevard.com\/iot-ics-security\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_modified_time":"2018-01-11T07:08:24+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto48229897.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/iot-ics-security\/","url":"https:\/\/securityboulevard.com\/iot-ics-security\/","name":"IoT and ICS Security - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securityboulevard.com\/iot-ics-security\/#primaryimage"},"image":{"@id":"https:\/\/securityboulevard.com\/iot-ics-security\/#primaryimage"},"thumbnailUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto48229897.jpg","datePublished":"2017-07-02T19:43:25+00:00","dateModified":"2018-01-11T07:08:24+00:00","description":"IOT and ICS Security","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/iot-ics-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/iot-ics-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/iot-ics-security\/#primaryimage","url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto48229897.jpg","contentUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto48229897.jpg","width":800,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/iot-ics-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"IoT and ICS Security"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P91vu9-5GhG","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1354184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/6042"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=1354184"}],"version-history":[{"count":0,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1354184\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media\/1354701"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=1354184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}