๐Ÿ“ฐ Enterprise Security Blog

Expert insights on IoT security, physical security, compliance, and risk management.

Smart Office Security Week in Review: The Seven Things That Mattered, April 22โ€“28, 2026

Smart Office Security Week in Review: The Seven Things That Mattered, April 22โ€“28, 2026

This week produced a joint intelligence advisory on Chinese state-sponsored IoT device hijacking, a major Cisco wireless security report confirming that 85% of organizations are getting hit through wireless and IoT, critical vulnerabilities in Siemens industrial edge and building automation systems, a landmark workforce report linking skills gaps to real breaches, and a new NIST initiative on OT network visibility. Here is what it means for organizations running connected office environments.

The OT-ISAC Advisory and the Hidden ICS Vulnerabilities in Your Smart Building Infrastructure

The OT-ISAC Advisory and the Hidden ICS Vulnerabilities in Your Smart Building Infrastructure

A consolidated OT-ISAC advisory published in April 2026 documents critical flaws across industrial control and management systems including AVEVA supervisory platforms, Horner field controllers, Anviz access control hardware, and BASControl20 building automation systems. The advisory assigns a moderate exploitation risk within 30 to 90 days for exposed deployments โ€” which describes a large share of smart building installations.

NIST's New OT Visibility Project: Why You Can't Secure What You Can't See in a Smart Office Network

NIST's New OT Visibility Project: Why You Can't Secure What You Can't See in a Smart Office Network

NIST's National Cybersecurity Center of Excellence has announced a new initiative focused on helping critical infrastructure organizations gain visibility into their operational technology environments. The project addresses a foundational problem that smart office and connected building operators face: most organizations do not have an accurate, current picture of what OT and IoT devices are on their networks or what those devices are doing.

The Skills Gap Is Now a Breach Statistic: What the SANS 2026 Workforce Report Means for OT and Smart Building Security

The Skills Gap Is Now a Breach Statistic: What the SANS 2026 Workforce Report Means for OT and Smart Building Security

The SANS 2026 Cybersecurity Workforce Research Report, released at RSAC 2026, found that skills gaps โ€” not headcount shortages โ€” have become the leading workforce challenge in cybersecurity, with 27% of organizations reporting breaches directly linked to capability gaps. In OT and smart building environments, where specialized knowledge is scarce and AI is eliminating the training pipeline, the implications are severe.

Siemens Industrial Edge Auth Bypass (CVE-2026-33892): What This ICS Vulnerability Means for Connected Offices and OT Networks

Siemens Industrial Edge Auth Bypass (CVE-2026-33892): What This ICS Vulnerability Means for Connected Offices and OT Networks

CISA released an advisory on April 21, 2026 disclosing a critical authentication bypass in Siemens Industrial Edge Management that allows unauthenticated remote attackers to access connected edge devices. The vulnerability affects organizations using Siemens industrial edge infrastructure for manufacturing, smart building management, and IT/OT convergence deployments.

When Your Security Cameras Become the Attacker's Infrastructure: The IoT Pivot Threat in Smart Buildings

When Your Security Cameras Become the Attacker's Infrastructure: The IoT Pivot Threat in Smart Buildings

Security cameras, smart displays, and building automation devices are no longer just passive targets in a cyberattack โ€” they are being actively repurposed as attack infrastructure. State-sponsored actors and criminal groups are using compromised IP cameras and IoT equipment as relay nodes, reconnaissance tools, and lateral movement staging points inside the networks they were supposed to protect.

85% of Organizations Got Hit Through Wireless: What the Cisco 2026 State of Wireless Report Means for Your Smart Office

85% of Organizations Got Hit Through Wireless: What the Cisco 2026 State of Wireless Report Means for Your Smart Office

Cisco surveyed 6,098 wireless decision-makers across 30 countries and found that 85% of organizations experienced wireless security incidents in the past year, with IoT and OT devices identified as the primary weak link. Half of those incidents cost over $1 million. Here is what the data means for organizations running connected smart offices.

China Is Weaponizing Your Office Router and IoT Devices: The Volt Typhoon and Flax Typhoon Threat Explained

China Is Weaponizing Your Office Router and IoT Devices: The Volt Typhoon and Flax Typhoon Threat Explained

A joint advisory from CISA, the FBI, NSA, and allied intelligence agencies issued April 22, 2026 confirms that Chinese state-sponsored groups are systematically compromising SOHO routers, IoT devices, and smart office equipment to build covert attack infrastructure. Your network edge devices are not just targets โ€” they are being turned into weapons.

The ODNI Report Nobody Read: China, Russia, Iran, and North Korea Are All-In on Your Critical Infrastructure

The ODNI Report Nobody Read: China, Russia, Iran, and North Korea Are All-In on Your Critical Infrastructure

The ODNI's annual threat assessment and Google's defense industrial base report confirm what a week of incidents has made viscerally clear: every major nation-state adversary has simultaneously prioritized critical infrastructure cyberattacks. The IoT and OT devices connecting your operations to the internet are their preferred entry point.

Vercel Got Hacked Through an AI Tool's OAuth Token โ€” Every Enterprise Using Third-Party AI Has This Problem

Vercel Got Hacked Through an AI Tool's OAuth Token โ€” Every Enterprise Using Third-Party AI Has This Problem

Attackers breached Vercel by compromising Context.ai's Google Workspace OAuth application, stealing an employee's credentials and accessing customer data. The attack vector โ€” a trusted third-party AI tool with OAuth access to enterprise systems โ€” is present in thousands of organizations.

Manufacturing Ransomware's 'New Normal': 800 Victims, Data Extortion, and Four Groups Running the Show

Manufacturing Ransomware's 'New Normal': 800 Victims, Data Extortion, and Four Groups Running the Show

Q1 2026 ransomware data confirms manufacturing's sustained crisis: 800+ victims across all sectors, attack volumes holding steady quarter-over-quarter, and a structural shift toward data extortion replacing traditional encryption. Four groups โ€” RansomHub, SafePay, Akira, and Qilin โ€” are running the industrial targeting playbook.

Local AI vs Frontier Models: How to Build Your Enterprise AI Strategy โ€” From Policy to Deployment, 5 to 5,000 Employees

Local AI vs Frontier Models: How to Build Your Enterprise AI Strategy โ€” From Policy to Deployment, 5 to 5,000 Employees

Should your organization run local AI models on internal infrastructure or use frontier models from OpenAI, Anthropic, and Google? The answer depends on your data sensitivity, team size, compliance requirements, and risk tolerance. Here's how to think through it โ€” and how to build the AI policy that governs whichever path you choose.

Ask Sage ๐Ÿค–