
Simple NIST cybersecurity Compliance for Manufacturing
As industrial technology advances, manufacturers are increasingly using cloud, data analytics and mobile to improve their connectivity and infrastructure. This means a larger attack surface which creates a rich target for threats that cause physical damage,…

Golidlocks problem of mobile device security in organizations
Usability vs. Security The “Goldilocks and the three bears” story begins with a girl tasting porridge. The first bowl is too hot, the second is too cold, and the third is “just right.” This article considers…

How to Actively Secure Your Industrial Environment In the New Era of Distrust
Today’s sophisticated Operations Technology (OT) environments have a large attack surface with numerous attack vectors. Without complete coverage, the likelihood of getting attacked is not a matter of ‘if’; it’s a matter of ‘when’. Security for OT…

Attack Vectors in the… Trillions?
The growing attack surface of the new Industry 4.0 internet is a big problem. On this everyone agrees. But underneath the headlines and the frequent “patch now” warnings from firewall vendors is a more ominous reality…

Six criteria to consider when evaluating industrial cybersecurity solutions
Converged infrastructure is only as valuable as it is secure. Attacks on critical infrastructure have grown in frequency and sophistication as bad actors, including nation states, seek to disrupt or disable essential services or to gather…

Use a Zero Trust Approach to Protect Your Smart Cities Projects from Hackers
Smart cities projects continue to gain momentum, given the need to address our aging infrastructure while enhancing the quality of life for both residents and visitors. New Internet of Things (IoT) and next generation network technologies…

Securing our Energy Future
ENERGY! – It’s the most vital, indispensable resource for sustaining and advancing humankind. Much as Oxygen is essential for all life on earth, Electricity – the foremost and primary useful energy form – is the core…

The Digital Cybersecurity Paradox
In 5 years there will be 75 billion devices connected to the internet, perhaps a few billion insecure and unpatchable. An estimated 2 billion run VxWorks and perhaps a couple hundred million of those will not…

In Security, Process is as Reliable as Luck
Lately, I have seen two common themes whenever IoT security is brought up; 1) complete acceptance that IoTs pose unique security challenges, and 2) how they have an IT/OT collaboration process to address them. Everybody knows…

Mind the Gap – a Road to IT/OT Alignment
Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. In a very standard environment, thousands of devices exist and are increasingly being connected via the Industrial Internet of Things (IIoT).…