
Cybersecurity Tactics to Prevent Ransomware
Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files unless a ransom is paid. More modern ransomware families, collectively…

The Immune System Approach – Cyber AI for Industrial Control Systems
The practice of cyber security has changed dramatically in the past few years, presenting a significant challenge to management teams across all industries and business domains. As IT security teams become accountable for securing Operational Technology…

Cybersecurity Tactics to Reduce ICS Software Supply Chain Risk
Supply chain attacks like the recent SolarWinds hack are now front-page news, and cybersecurity steps must be taken to reduce the risk these attacks pose to critical systems. A platform that enables end users to manage…

The Clock is Ticking for a New Cyber Security Strategy
President Biden is walking into an embattled and in some ways grim cyber security picture. As we know, the end of 2020 brought to our attention a months-long global cyber-espionage campaign, The broader public will almost…
![[White Paper]Protecting the Embedded and IoT Software Build Environment with Software Composition Analysis](https://www.iiot-world.com/wp-content/uploads/2021/01/computer-software-coding-with-abstract-binary-data-1024x614.jpg)
[White Paper]Protecting the Embedded and IoT Software Build Environment with Software Composition Analysis
Ensuring the quality, reliability and safety of software requires navigating a complex supply chain made up of engineers, operations managers, contractors, and independent software vendors (ISVs), along with open source software (OSS) providers. Oftentimes, device manufacturers…

After a Cybersecurity Attack Like SolarWinds: Rebuilding a Network
In a recent article in The Guardian regarding the SolarWinds cybersecurity attack, security technologist Bruce Schneier said, “We have a serious problem. We don’t know what networks they are in, how deep they are, what access they have,…

Digital Transformation: A One-Two Punch to Empower Employees and Protect Data
As the COVID-19 pandemic continues to impact business and the economy worldwide, companies in every industry are using a critical eye to prioritize their operations amidst shrinking budgets and a catalog of unknowns. This includes exploring…

Creating a Comprehensive Framework to Protect Operational Technology Assets
The ability to remotely manage systems including HVAC units, vehicle fleets, manufacturing equipment and other operational technologies (OT) is seen as a tremendous time and money saver. However, a failure to properly protect OT assets can…
![[White Paper] Operational Technology Cybersecurity](https://www.iiot-world.com/wp-content/uploads/2017/06/3818200-1024x683.jpg)
[White Paper] Operational Technology Cybersecurity
The purpose of control system cybersecurity is to protect the control systems and the processes they monitor and control from electronic threats — that is, to “keep lights on and water flowing.” Networks are a support…

Insights into WP.29 and the Automotive Sector
Interview by Greg Orloff, Senior Analyst and CBDO with IIoT World and Ian Todd, IoT Practice Lead, Security Services with BlackBerry on WP.29 Visit this link for more information on WP.29 The UNECE World Forum for…