
Deciphering Executive Order 14028: Improving the Nation’s Cybersecurity
An Executive Order (EO) issued by a U.S. President is usually a pretty straightforward document. Most are just two or three pages long with a handful of directives. This is definitely not the case with President…

Cybersecurity Gaps in Scanning and Patching Vulnerabilities in Software
Current strategies of scanning for and patching vulnerabilities in software leave a huge and highly-exploitable security gap. Recent research by RunSafe Security partners show that current strategies of scanning for and patching vulnerabilities in software leave…

eBook: Manufacturing Cybersecurity Case Studies
For factories and manufacturers, the need for cybersecurity is urgent. This is due to the concerns arising from operation stoppages caused by security incidents, resulting in loss of revenue. Unlike enterprise IT, system administrators face several…

White Paper: The State of Industrial Cybersecurity
While global manufacturing companies are implementing digital transformation to survive and grow, cybersecurity threats have become a top concern. In industrial cybersecurity, the convergence of IT and OT has been an important issue for long time.…

Protecting IT and OT Resources Against Advanced Threats in Manufacturing
Manufacturing organizations manage expensive and sophisticated equipment at their factories—and the systems that run the machinery are increasingly being connected to the internet. The cybersecurity implications of this trend are significant, including possible threats to physical…

How Industrial Control Systems can be secure in the cloud
Last month, a major water utilities firm in the UK revealed plans to move a significant part of their SCADA system to the cloud. This is one of the most high-profile transitions of OT to managed cloud services…

How will US sanctions on the group behind TRITON protect critical infrastructure?
In late October 2020, the US Federal Government announced plans to impose sanctions on a Russian research institute that has been linked with cyber-attacks. The institute is alleged to have played a part in building the customized tools…

Cybersecurity for Shared Cloud Environments
In its recent Cloud Workload Protection Platform (CWPP) research note, Gartner identified memory exploit protection as an essential component of any organization’s CWP strategy (Gartner, Cloud Workload Protection Platforms, 2020): “Exploit Prevention/Memory Protection–application control solutions are…

Security Risks Are Slowing IT-OT Convergence
Fortinet has worked with Forrester Consulting for a third time to check in on security trends affecting those who manage and maintain critical infrastructure—including the industrial control systems (ICS) and supervisory control and data acquisition (SCADA)…

Protecting Traditional Stand Alone OT Systems As They Are Introduced To The IIoT
Re-Emagineering the CyberSecurity driven convergence of OT to IIOT The exploitation and sabotage of resources has been a concern to mission critical operations since the dawn of the industrial age. With the advancement of Information Technology…