/  ICS Security   /  Cybersecurity

The rise of the Internet of Things (IoT) is like the advent of the Internet all over again. From the perspec- tive of new business models and process transformation, IoT applications are perhaps even greater than what the Information Superhighway

Sponsored by RunSafe Security Cyberattacks are becoming far too common, especially after the COVID-19 pandemic, as companies are changing how they’re doing business. Cyber-attacks on enterprises’ software, in particular, have already affected millions of users. Unfortunately, these will continue to impact more

Artificial Intelligence, or AI, isn’t actually a new concept. In fact, it’s been around since the 1950s. The problem back then was that computers lacked the ability to store commands, so they could be told what to do but couldn’t

5G is projected to have an impact on the future, though its effects are already being felt today. A part of this conversation is the 4G/5G campus network, which is being rolled out in smart factories, remote power stations, harbors,

Many predictions from ten years ago about a rapid rise in cyber-physical attacks did not come true. Certainly, there has been significant financial damage to many firms resulting from powerful intrusions and attacks. However, relative to the IT world, OT

In September 2016, the Mirai malware cyberattack shook the IoT world with a DDoS attack model that infected over 600,000 IoT devices. Such attacks on network-attached devices and IoT devices continue to increase exponentially. With the IDC predicting that there will

Vulnerability Management in OT or ICS cyber security is a challenge, but with an actionable strategy and existing IT/ OT cyber security tools, we can make a significant difference. What is OT/ICS vulnerability management? Vulnerability management in OT/ICS security is the process

The Industrial Internet of Things (“IIoT”) is evolving at a rapid pace, with experts predicting that 35 billion IoT devices1 will be installed around the world by the end of 2021, so the question is "How to combat the cybersecurity

In March 2021, the Enterprise Strategy Group completed a research survey of 150 senior information technology (IT), cybersecurity, and operational technology (OT) professionals directly knowledgeable about their organization’s OT security practices. Organizations represented were from verticals in the retail supply