01.06.2020 Views

Cyber Defense eMagazine June 2020 Edition

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• Comprehensive communication coverage. The strategy should be able to directly monitor all<br />

communication pathways that could be used in a cyber attack, including Ethernet, Wi-Fi,<br />

Bluetooth, BLE, and possibly other wireless protocols such as Zigbee. Wireless coverage is<br />

important because attackers can exploit vulnerabilities such as BlueBorne, KRACK and<br />

Broadpwn to compromise OT devices wirelessly, without any user interaction.<br />

Protecting OT devices from a growing list of cyber attacks and vulnerabilities brings many challenges,<br />

but can be achieved with the right focus, backed by the right tools. What’s clear is that industrial and<br />

manufacturing organizations cannot use traditional methods to secure OT devices being used in nontraditional<br />

ways. As these essential devices continue to be integrated into enterprise networks, a new<br />

approach must be used to keep them from being exploited and, ultimately, leaving valuable processes at<br />

risk of disruption.<br />

About the Author<br />

Chris Dobrec, Vice President of Product Marketing, Armis.As Vice<br />

President of Product Marketing, Chris is responsible for Armis’ product<br />

marketing strategy and vision. He is a seasoned product and business<br />

development executive leading teams through development and<br />

marketing of exceptional products and cutting-edge technologies<br />

across enterprise and consumer market segments. Prior to Armis,<br />

Chris held executive management roles in product management,<br />

product marketing and business development at MobileIron, Cisco,<br />

Nokia, Ipsilon Networks and Kalpana. Chris’ journey to Silicon Valley<br />

started after leaving college early to pursue his passion for building<br />

great products. He can be reached by Armis’ company website at<br />

www.armis.com.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 112<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!