
Smart Factory Case Studies
This summary contains three Smart Factory success stories in IoT manufacturing, from the Semiconductor, Manufacturing and Electrical Engineering industries. They describe how Trend Micro expertise and solutions addressed a variety of business challenges, including security solutions…

Ensuring cybersecurity resilience in an ultra-connected world
The development of the Internet of Things (IoT), Artificial Intelligence (AI), the cloud and big data have enabled devices that started out as unbelievable concepts to become a reality. From a consumer standpoint, these ever-increasing trends…

Report Summary: Cyber Attacks on Smart Manufacturing Systems
Smart manufacturing systems are designed and deployed under the assumption that they will be isolated from both the outside world and the rest of the corporate network. On one hand, this does not necessarily mean that…

Attacks on Smart Manufacturing Systems: A Forward-looking Security Analysis
Smart manufacturing systems can be seen as the modern implementation of the totally integrated automation (TIA) concept that has been developed by Siemens since 1996. But such is the complexity of smart manufacturing systems that it…

An Assessment of Presidential Executive Order 13920 – Securing the United States Bulk-Power System
I do not know what precipitated the issuance of the May 1st, 2020 Executive Order. However, this new Executive Order is long overdue, and addresses many longstanding concerns. The Executive Order demonstrates a high level of…

Cybersecurity and Productivity – What is Their Relationship?
Welcome to the Industrial Internet of Things (IIoT) data problem series. The goal of this series is to help leaders understand the data problems that industrial businesses face when deploying IIoT networks. Cybersecurity in productivity was…

How to Avoid the Most Common Micro-segmentation Mistakes
It’s possible to protect critical infrastructure without compromising security or your budget — find out how. The Need for Micro-segmentation Industry experts and organizations such as NIST, PCI, and the U.S. Department of Defense are all…

IoT Security: Tips on How to Make Your Smart Devices Really Secure
5G is going to change the game for industrial operations. We’ll be able to access more data than before, faster than ever before. For manufacturers, though, one of the primary advantages will come in the form…

Maximize IIoT Device Profitability and Customer Satisfaction with Yocto
To maximize IIoT device profitability and customer satisfaction, users can take a few simple steps to augment yocto’s robust platform with tooling to increase security and decrease update frequency, while still maintaining aggressive delivery timelines. Yocto…

Working From Home? Here’s What You Need for Cybersecurity
There has been an influx of employees signing in remotely to corporate networks and using cloud-based applications. But this shift could also open doors to cybersecurity risks. Where should cybersecurity fit in? The current workplace reality…