Simple NIST cybersecurity Compliance for Manufacturing

Simple NIST cybersecurity Compliance for Manufacturing

As industrial technology advances, manufacturers are increasingly using cloud, data analytics and mobile to improve their connectivity and infrastructure. This means a larger attack surface which creates a rich target for threats that cause physical damage,…

Attack Vectors in the… Trillions?

Attack Vectors in the… Trillions?

The growing attack surface of the new Industry 4.0 internet is a big problem. On this everyone agrees. But underneath the headlines and the frequent “patch now” warnings from firewall vendors is a more ominous reality…

Securing our Energy Future

Securing our Energy Future

ENERGY! – It’s the most vital, indispensable resource for sustaining and advancing humankind. Much as Oxygen is essential for all life on earth, Electricity – the foremost and primary useful energy form – is the core…

The Digital Cybersecurity Paradox

The Digital Cybersecurity Paradox

In 5 years there will be 75 billion devices connected to the internet, perhaps a few billion insecure and unpatchable. An estimated 2 billion run VxWorks and perhaps a couple hundred million of those will not…

In Security, Process is as Reliable as Luck

In Security, Process is as Reliable as Luck

Lately, I have seen two common themes whenever IoT security is brought up; 1) complete acceptance that IoTs pose unique security challenges, and 2) how they have an IT/OT collaboration process to address them. Everybody knows…

Mind the Gap – a Road to IT/OT Alignment

Mind the Gap – a Road to IT/OT Alignment

Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. In a very standard environment, thousands of devices exist and are increasingly being connected via the Industrial Internet of Things (IIoT).…