-
How to improve operational resilience in a multi-vendor and multi-site world
Introduction to OT/ICS Security Reviewing the OT cybersecurity threat landscape from 2021 to 2022, we have observed that since the outbreak of the COVID-19 crisis, the world’s reliance on networks and information systems has surged to unprecedented levels, with industries and
-
Securing the ICS Software Supply Chain | SPONSORED
In today's interconnected world, the security of industrial control systems (ICS) is of utmost importance. The risk of software backdoors in the ICS software supply chain is a growing concern that needs to be addressed. In an upcoming session, experts
-
What could an OT cyberattack cost you?
If there’s one thing every operator, plant manager and OT expert knows, it’s that downtime is never an option. While no company likes to have its IT systems and data on lockdown, there can be devastating consequences for an OT
-
Understanding OT-Native Cybersecurity
Dave Purdy, OT Cybersecurity Specialist at TXOne, was recently interviewed by ARC’s Vice President, Cybersecurity Services Sid Snitkin at the 2023 ARC Forum, held in Orlando, Florida. We encourage you to view this valuable discussion, as they touched upon the
-
Protecting against new types of threats and attack vectors
Following on from the first part of this article entitled, ‘Readying Industrial IoT Networks for Today’s Security Challenges’, which reviews the standardized way to approach security, this article goes through ways to protect against new and emerging threats. Protecting our valuables The
-
Readying IIoT Networks for Today’s Security Challenges
Cyber attacks can often seem like the opening scene of a science fiction movie. The mouse pointer starts gliding across a screen with purpose. A technician, looking up to review data on their monitor, sits motionless, frozen through the shock
-
The MetaDefender Kiosk K2100: Military-Grade Portable Media Security Solution
In today's digital age, critical infrastructure industries rely heavily on operational technology (OT) and industrial control systems (ICS) to run their operations. However, these systems are often isolated through air-gapped networks, making OT personnel dependent on removable media devices to
-
Navigating the Challenges of Network Segmentation and Microsegmentation Without Disrupting Operations
Network segmentation offers many benefits for businesses. Segmentation improves security by preventing attacks from spreading across a network and infiltrating unprotected devices. In the event of an attack, segmentation ensures that malware cannot spread into other business systems. Network segmentation
-
How to Protect Your OT Network — Without Disrupting Operations
A good portion of existing operational technology (OT) networks were originally built during the air gap days, where isolation from other enterprise systems made for sufficient security. As digital transformation initiatives drive IT and OT networks towards convergence, the result
-
BMS Security: 3 Tips for OEMs to Better Protect Their Devices
Connected Building Management Systems (BMS) definitely make a difference in terms of increasing operational performance, reducing energy and maintenance costs, and improving building health and safety. None of this could happen if it weren’t for Original Equipment Manufacturers (OEMs) like