Does Micro-Segmentation Really Offer Ultimate Protection for OT/IoT/IoMT Devices?

Micro-segmentation – dividing up your network and setting controls for each part – is currently the trendy solution to have for securing OT, IoT, and IoMT devices, but this belief overlooks several critical realities. Limited Visibility Problem: In environments with OT, IoT, and IoMT devices, installing agents is not feasible, nor do these devices always […]

New Vulnerability Allows for Next Generation Rogue Access Point

By Uriya Elkayam – As part of our research, we found a vulnerability by-design in the Wi-Fi protocol that under OWE mode exposes Hidden Networks. This means that a hidden wireless network name is open to all, not just to a device attempting to access a pre-known hidden network.