CYBERS brings IoT security to RigaComm IoT conference

CYBERS 05.10.2021

As we are steaming forward on our digitalization journey, security is quite often left behind. Why would you care, if your TV has an antivirus? What does it matter, who has access to your smart-fridge? Who cares about the security of your SCADA server… wait, what?

Every device, which is connected to the Internet has the potential to become a backdoor for cyber-criminals to gain access to your core network and systems. To make matters worse, the creators of those IoT (and OT) devices often feel the same way, e.g. ignore security and hope for better.

Unfortunately, this kind of approach to security is a huge misstep and has been a proven case study for disasters. Operational Technology (OT) has been a focus of the so-called supply-chain attacks, where 1 target is compromised, leading to a forest-fire like cyber infections to multiple organizations. Internet of Things (IoT) attacks have been a part of a powerful combo (alongside spear phishing) to target C-level managers of companies to gain privileged access.

This is why CYBERS is excited to be a part of the most prominent IoT conference and trade show this October. Our Head of Sales, Vladimir Jelov, will share some of the war stories regarding IoT/OT security, as well as tips for ensuring that devices, which are a natural part of your environment, don’t become a security risk on the main stage.

Feel free to talk about cybersecurity and IoT. After all, CYBERS is the leading cybersecurity services provider with a portfolio of services, such as penetration testing, SOC, red-teaming, ISO27001, and many more. Our team will also have the latest news about potential discounts from our technology partners, such as Vectra, Crowdstrike, IBM, McAfee, Recorded Future, and many more.

Latest blog posts


Cybersecurity as part of defense measures against modern war fighting capabilities

CYBERS in cooperation with Recorded Future will share insights on the ongoing cyber crisis which started several months before the military invasion. This article provides an overview of the current situation, as well as the recommended emergency actions that should be taken by organizations to withstand this cyber conflict.

Keep reading

Testing and identifying the value of your next cybersecurity solution

The security world is changing rapidly and we are slowly reaching another huge milestone. Not a very happy one though: manual security operations are no longer sufficient. This is a little bit painful to admit but the fact remains: if you rely on the manual labour of CTOs, CISOs and their teams to react to an incident, then you are in for a very rude awakening.

Keep reading

Are you at risk from the security vulnerability found in the Java-based Apache Log4j logging feature?

A security hole was discovered in the Java-based Log4j logging feature, affecting millions of businesses, government agencies, and cloud services using this popular Apache library. Are you at risk?

Keep reading