Trend Micro Cybersecurity Reference Architecture for Operational Technology
· Cybersecurity

Trend Micro Cybersecurity Reference Architecture for Operational Technology

The evolution of the Internet of Things (IoT) has made life a lot more convenient and productive for both consumers and businesses alike over past few years, but on the other side, cybersecurity is an emerging challenge. For automobile original equipment manufacturers (OEMs), Tier 1 suppliers, car dealers, service providers, car owners and drivers, cyberattacks […]

Read more →
Eminence at the Edge
· Digital Disruption

Eminence at the Edge

Since Internet of Things technology started to gain mainstream traction, multiple platforms, solutions and strategies have been developed. At the moment there are more than 450 ‘platforms’ commercially available. Yet, realistically speaking, most of these have been designed for a very specific function on outdated technology and mostly down a vertical application path. Similarly, gateway […]

Read more →
Nico Steyn, CEO
· Our Contributors

Nico Steyn, CEO

Nico Steyn is a respected entrepreneur in technology in South Africa and with his team a leading innovator in the development of new technologies offered by the Internet of Things. Nico co-founded IoT.nxt in 2015 and serves as the company’s CEO. Prior to the establishment of IoT.nxt he was the Managing Director of a leading […]

Read more →
Wireless Reshaping IT/OT Network Best Practices
· Connected Industry

Wireless Reshaping IT/OT Network Best Practices

While wireless has been a part of networking for more than a decade, the advent of the Internet of Things (IoT) will make significant changes in the way network architectures end up designed. Nowhere will those changes be more immediate or far-reaching than in the ways wireless systems are used in IIoT, so we need to follow IT/OT network […]

Read more →
How to invest your first dollar in Industrial Cybersecurity?
· Cybersecurity

How to invest your first dollar in Industrial Cybersecurity?

Wanacry and NotPetya achieved what the experts were struggling to do: propel cybersecurity issues on board and raise awareness. Recent cyber-attacks have already cost businesses a lot and encourage top management to invest now their first money in their ICS cybersecurity. Once companies are ready to invest, the following questions arise: what level of security […]

Read more →
Next generation analytics is doing tremendous things
· Predictive Analytics

Next generation analytics is doing tremendous things

The compelling nature of today’s highly-polished BI and advanced visualizations inflates the credibility of conclusions that appear to be supported by big data analyses. After all, if we can manage to collect and properly condition volumes of data, in varied forms, at a rapid pace, in the face of uncertainty, then the end result must […]

Read more →
Adhering to the NIST Cybersecurity Framework with the Indegy Platform
· Cybersecurity

Adhering to the NIST Cybersecurity Framework with the Indegy Platform

US national security depends on the reliability and continuous operations of the nation’s critical infrastructure. The increasing complexity and connectivity of critical infrastructure systems exposes them to cybersecurity threats which put their safety and reliability at risk. The National Institute of Standards and Technology (NIST) Framework was created through the collaboration of the government and […]

Read more →
Dana Tamir, VP Market Strategy
· Our Contributors

Dana Tamir, VP Market Strategy

Dana is a veteran of the cybersecurity industry with over 15 years of real-world expertise and leadership roles in leading security companies. Currently, Dana is the VP Market Strategy at Silverfort. Before joining Silverfort, Dana served as VP Marketing at Indegy. Before that, she served as Director of Enterprise Security at Trusteer (acquired by IBM in 2012). […]

Read more →
How phishing is affecting manufacturing and other industries
· Cybersecurity

How phishing is affecting manufacturing and other industries

For hackers, phishing is easy. And profitable. The average phishing attack costs a mid-sized company $1.6 million.[i] No wonder the number of phishing attacks shot up 65% worldwide last year.[ii] For many years, organizations have invested in technology to keep them safe from malicious emails. Yet ransomware, CEO fraud/business email compromise (BEC) and breaches stemming […]

Read more →
9 questions you should ask before choosing a security vendor
· Cybersecurity

9 questions you should ask before choosing a security vendor

There are many companies that provide security products and services for IT and OT environments. Needless to say, selecting the right vendor is key to the success of cybersecurity implementation across the organization. To help you make the ideal choice, here are some questions you might want to consider when evaluating the security vendor options […]

Read more →
IoT in Manufacturing: How will IIoT technology improve your business?
· Connected Industry

IoT in Manufacturing: How will IIoT technology improve your business?

If someone were to ask you what you were doing on Tuesday, September 11, 2001, chances are that you would be able to recall what happened in great and vivid detail. You’d remember who you were with, what you were thinking at the time, what you were feeling, and what you had planned to do. […]

Read more →