Protecting against new types of threats and attack vectors
Following on from the first part of this article entitled, ‘Readying Industrial IoT Networks for Today’s Security Challenges’, which reviews the standardized way to approach security, this article goes through ways to protect against new and…
Readying IIoT Networks for Today’s Security Challenges
Cyber attacks can often seem like the opening scene of a science fiction movie. The mouse pointer starts gliding across a screen with purpose. A technician, looking up to review data on their monitor, sits motionless,…
The MetaDefender Kiosk K2100: Military-Grade Portable Media Security Solution
In today’s digital age, critical infrastructure industries rely heavily on operational technology (OT) and industrial control systems (ICS) to run their operations. However, these systems are often isolated through air-gapped networks, making OT personnel dependent on…
Navigating the Challenges of Network Segmentation and Microsegmentation Without Disrupting Operations
Network segmentation offers many benefits for businesses. Segmentation improves security by preventing attacks from spreading across a network and infiltrating unprotected devices. In the event of an attack, segmentation ensures that malware cannot spread into other…
How to Protect Your OT Network — Without Disrupting Operations
A good portion of existing operational technology (OT) networks were originally built during the air gap days, where isolation from other enterprise systems made for sufficient security. As digital transformation initiatives drive IT and OT networks…
BMS Security: 3 Tips for OEMs to Better Protect Their Devices
Connected Building Management Systems (BMS) definitely make a difference in terms of increasing operational performance, reducing energy and maintenance costs, and improving building health and safety. None of this could happen if it weren’t for Original…
Addressing Operational Technology Equipment Flaws with Zero-Trust Controls
A new report on Operational Technology (OT) equipment flaws from automated cybersecurity software company Forescout outlines the alarming state of OT security. The report titled OT:ICEFALL was crafted by researchers at the company’s Vedere lab. It…
Q&A on Cyber Resiliency for Operational Technology
As recent cyberattacks have demonstrated increased risk to both IT and operational technology (OT) environments, resilience readiness today has evolved. It is more than a cybersecurity strategy and involves the enforcement of rules and policies that…
A priority investment: cyber security
The accelerating transition to digital transformation, with much data and information being processed on the cloud, has opened up exciting new business opportunities, but it has also increased the risk that manufacturing companies may suffer in…
IT vs OT: Information Technology (IT) vs. Operational Technology (OT) Cybersecurity
What is OT? Understanding Operational Technology (OT) Operational Technology (OT) refers to the technology and systems used to monitor, control, and manage physical processes and devices in various industrial and infrastructure sectors. Operational technology (OT) uses…