The Daily Swig
The growing threat of drones
ICS Cybersecurity Conference
“Like any smart device,” comments Chris Morales, head of security analytics at Vectra, “the manufacturer needs to provide a method for the owner to update the software for security patches as well as ensure they have strong device password authentication. Lastly, the device should use a form of remote encrypted communication that is reasonably strong and resistant from man in the middle attacks and device hijacking.”