The ICS Security considerations checklist

The ICS Security considerations checklist

As you evaluate ICS cyber security solutions to protect your critical infrastructure from threats, there are a few criteria your team must consider throughout the process. We’ve compiled a checklist to help you select a solution…

TPM – a Powerful, Inexpensive Security Building Block

TPM – a Powerful, Inexpensive Security Building Block

There are two worlds of computer security – high-end systems and then everything else.   Both high- and low-end systems typically employ “top-down” defenses to harden their attack surfaces.  These are “software-only” security techniques.High-end and specialized systems…

Is OT Cybersecurity Better Bolted-On or Designed-In?

Is OT Cybersecurity Better Bolted-On or Designed-In?

Power grid outages driven by malware, dam control system attacks, vehicle onboard system hijacking:  recent incidents like these show how critical cybersecurity has become in connected operational technology. But if you think OT is “just IT…

IIC: The Endpoint Security Best Practices White Paper

IIC: The Endpoint Security Best Practices White Paper

The Industrial Internet Consortium published today the Endpoint Security Best Practices white paper. The intended audience includes industrial equipment manufacturers, integrators, and industrial equipment owners and operators. All can benefit by obtaining a clear description of what countermeasures…