by Paul Konikowski | Dec 20, 2019 | Insights, News
By now, most readers have probably heard about the numerous 4G and 5G network security vulnerabilities found in Chinese manufacturer Huawei’s product line. ZTE’s routers have also been determined to be insecure. These are prime examples of supply chain attack vectors....
by Paul Konikowski | Oct 29, 2019 | Uncategorized
In the 1990’s, Erik Byrnjokfsson wrote a series of papers beginning with “The Productivity Paradox of Information Technology” (1993) where he analyzed the relationship between information technology (IT) and productivity. Initial studies showed that, on average, IT...
by Paul Konikowski | Sep 10, 2019 | Insights, News
As more and more AV devices find themselves on IP networks, the surface area for cyberattacks increases. Generally speaking, I advocate for AV devices to be placed on dedicated AV networks, not on the local area network, but this is not always possible. In either...
by Paul Konikowski | Aug 6, 2019 | News
The Stuxnet and Target attacks have squashed many of the myths about securing industrial control system security. Wait, you don’t know about Stuxnet and Target? The Stuxnet Worm, first discovered in 2010, was responsible for damaging approximately 1/5th of the...
by Paul Konikowski | Jul 9, 2019 | Insights, News
Logic bombs are a form of malicious code whose effects are purposefully delayed by design. The name “logic bomb” stems from the classic ticking bomb imagery often depicted in James Bond type movies. The logic bomb initially goes unnoticed during its...