Attacks on Smart Manufacturing Systems: A Forward-looking Security Analysis
Smart manufacturing systems can be seen as the modern implementation of the totally integrated automation (TIA) concept that has been developed by Siemens since 1996. But such is the complexity of smart manufacturing systems that it…
An Assessment of Presidential Executive Order 13920 – Securing the United States Bulk-Power System
I do not know what precipitated the issuance of the May 1st, 2020 Executive Order. However, this new Executive Order is long overdue, and addresses many longstanding concerns. The Executive Order demonstrates a high level of…
Cybersecurity and Productivity – What is Their Relationship?
Welcome to the Industrial Internet of Things (IIoT) data problem series. The goal of this series is to help leaders understand the data problems that industrial businesses face when deploying IIoT networks. Cybersecurity in productivity was…
How to Avoid the Most Common Micro-segmentation Mistakes
It’s possible to protect critical infrastructure without compromising security or your budget — find out how. The Need for Micro-segmentation Industry experts and organizations such as NIST, PCI, and the U.S. Department of Defense are all…
IoT Security: Tips on How to Make Your Smart Devices Really Secure
5G is going to change the game for industrial operations. We’ll be able to access more data than before, faster than ever before. For manufacturers, though, one of the primary advantages will come in the form…
Maximize IIoT Device Profitability and Customer Satisfaction with Yocto
To maximize IIoT device profitability and customer satisfaction, users can take a few simple steps to augment yocto’s robust platform with tooling to increase security and decrease update frequency, while still maintaining aggressive delivery timelines. Yocto…
Working From Home? Here’s What You Need for Cybersecurity
There has been an influx of employees signing in remotely to corporate networks and using cloud-based applications. But this shift could also open doors to cybersecurity risks. Where should cybersecurity fit in? The current workplace reality…
Industrial Cyber Security: Why IT & OT collaboration is no longer an option but a necessity
Since the mid-1990s, many industrial companies have interconnected their industrial control systems (ICSs) to improve productivity, maintenance, and safety in the operational environment. Some of this interconnectivity was to the Internet. While, this connectivity helped to…
Medical Device Safety and Security: Obvious but not easy to achieve
With accelerating technology innovation, medical devices are becoming more sophisticated and more connected. Consequently, as in most mission-critical systems, safety and security are two increasingly vital requirements in medical device design. In April 2018, the U.S.…
Control system cybersecurity is being discussed but still with misunderstandings
I attended a number of sessions at the February 24-27, 2020 RSA 2020 Cybersecurity Conference in San Francisco. One of the sessions really struck me as getting it right. The session I found most compelling was with…