What you need to know about Cybersecurity when adopting IIoT solutions
According to an article published by Trend Micro: “in 2018, digital extortion will be at the core of most cybercriminals’ business model and will propel them into other schemes that will get their hands on potentially…
The ICS Security considerations checklist
As you evaluate ICS cyber security solutions to protect your critical infrastructure from threats, there are a few criteria your team must consider throughout the process. We’ve compiled a checklist to help you select a solution…
Hacking Level 0,1 devices can be more significant than Stuxnet
Last week, the cyber security focus was on the four natural gas pipeline companies that had their electronic data interfaces, not control systems, hacked. However, from a control and safety system perspective, I believe the more…
TPM – a Powerful, Inexpensive Security Building Block
There are two worlds of computer security – high-end systems and then everything else. Both high- and low-end systems typically employ “top-down” defenses to harden their attack surfaces. These are “software-only” security techniques.High-end and specialized systems…
Is OT Cybersecurity Better Bolted-On or Designed-In?
Power grid outages driven by malware, dam control system attacks, vehicle onboard system hijacking: recent incidents like these show how critical cybersecurity has become in connected operational technology. But if you think OT is “just IT…
IIC: The Endpoint Security Best Practices White Paper
The Industrial Internet Consortium published today the Endpoint Security Best Practices white paper. The intended audience includes industrial equipment manufacturers, integrators, and industrial equipment owners and operators. All can benefit by obtaining a clear description of what countermeasures…
Four Advantages of Hiring a Specialized Security Partner for your Smart Manufacturing Processes
Cyberattacks against financial companies such as JPMorgan Chase and Citigroup and vendors such as Target, eBay, and Home Depot have received so much media attention these past years. Unknown to many, smart manufacturing companies are also…
Securing IoT Devices and Traffic between IoT Sensors and Cloud Analytics
It is well documented that IoT devices have introduced new security risks. Most IoT devices must interface to cloud based management and analytics engines and therefore support a TCP/IP stack for this communication. Our IoT endpoint…
Two key capabilities in the advancement of IoT network security and cyber defense
Nowadays, cyber-attacks are automated but still under human direction and control, and therefore cyber defenses must also be automated to have any chance of protecting cyber and digital assets from both the automated attacks and the…
5 Must-Attend industrial cybersecurity trade shows and events in the next 8 months
Industrial cybersecurity tradeshows and events take place all over the world, happening year round. We’ve compiled this list of what we feel are the 9 must-attend events for leading professionals in ICS cybersecurity. 2018 year’s events…