In Security, Process is as Reliable as Luck

In Security, Process is as Reliable as Luck

Lately, I have seen two common themes whenever IoT security is brought up; 1) complete acceptance that IoTs pose unique security challenges, and 2) how they have an IT/OT collaboration process to address them. Everybody knows…

Mind the Gap – a Road to IT/OT Alignment

Mind the Gap – a Road to IT/OT Alignment

Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. In a very standard environment, thousands of devices exist and are increasingly being connected via the Industrial Internet of Things (IIoT).…

Using a Zero Trust Approach to Defeat Ransomware Attacks

Using a Zero Trust Approach to Defeat Ransomware Attacks

The scourge of ransomware is not new, but recent months have seen a spate of fresh attacks on city governments. One high-profile example is Baltimore, which faced a lengthy system outage in May and June after…

Manufacturing Case Study – Securing Nesher Cement Enterprises

Manufacturing Case Study – Securing Nesher Cement Enterprises

Nesher Israel Cement Enterprises is the largest cement producer in Israel. With a large-scale production sites in Ramla and Haifa, Nesher produces about 60% of the cement used by Israel’s construction industry. With the introduction of…

The Cybersecurity Implications of Infrastructure Modernization

The Cybersecurity Implications of Infrastructure Modernization

The adoption of new technologies in oil and gas facilities is a dual-edged sword. On one side, there are the obvious benefits of implementing industrial internet of things (IIoT) devices to improve efficiencies and reduce operational…

Cybersecurity Q&A with ABB

Cybersecurity Q&A with ABB

According to a study by Inmarsat Enterprise that surveyed 125 businesses across the energy industry, 74% of respondents admitted that their processes to combat cybersecurity threats were lacking, while 73% of them reported that more could be done to protect…

How would you secure over 10 million IIoT devices?

How would you secure over 10 million IIoT devices?

Industrial IoT (IIoT) devices will comprise the majority of the billions of IoT devices deployed over the next decade. How will the information security market meet this onslaught of technology? The consumer market is not a…

The Guide to Choosing an Industrial Cybersecurity Solution

The Guide to Choosing an Industrial Cybersecurity Solution

As you evaluate ICS cyber security solutions to protect your critical infrastructure from threats, there are a few criteria your team must consider throughout the process. We’ve compiled a checklist to help you select a solution that…

[New IIC white paper] Data Protection Best Practices

[New IIC white paper] Data Protection Best Practices

Protecting sensitive data created, stored and consumed by sensor-driven Industrial Internet of Things (IIoT) technology and applications is one of the foundations of trustworthy IIoT systems. Broadly speaking, data protection measures resist internal and external disturbances…