[Research] Risks of the Industrial IoT in Compromised Campus Networks
5G, along with its role in industries, is a popular topic. An important part of this conversation is the campus network, which serves as one of the key implementations of…
Why Cyber Change Outpaces Boardroom Engagement
Humans are addicted to stories. But sometimes the stories we tell are overly simplistic. In cybersecurity, a recurring narrative is one of C-suite executives perpetually at odds with IT leaders.…
[Report] ICS cybersecurity for the Electric Utilities Industry
The risk of security incidents is rapidly increasing in the electric industry, which plays a crucial role in critical infrastructure. This is due to the increasing vulnerability of the system…
Cybersecurity for Industrial Control Systems: Part 1
In this two-part series, we look into various cybersecurity threats that affected industrial control systems endpoints. We also discuss several insights and recommendations to mitigate such threats. The ever-changing technological…
When Industrial Protocol Translation Goes Wrong
A recent research paper delves into the vital role of protocol translation in industrial facilities by looking at the protocol gateway. It is a small device that translates the different…
Attacks from 4G/5G Core Networks: Risks of the Industrial IoT in Compromised Campus Networks
5G is projected to have an impact on the future, though its effects are already being felt today. A part of this conversation is the 4G/5G campus network, which is…
Cybersecurity for Cloud Migration
In an interview with Merritt Baer (AWS Office of the CISO), Aaron Ansari VP, Cloud Security at Trend Micro discusses how fundamental information security is to business functions in today’s…
Cybersecurity Threats to ICS Endpoints
As the interconnection between IT (information technology) and OT (operational technology) continues to grow, cybersecurity for Industrial Control Systems (ICS) is becoming more important. Trend Micro shares their findings on…
Cybersecurity Risks for Open Source Code
The adoption of open source code has increased exponentially over the past decade, with a large percentage of commercial software now containing it. Developers are constantly sharing common features and code functionality…
Cybersecurity Tips to Avoid Ransomware Attacks
This latest ransomware attack on Colonial Pipeline is another call to action for all organizations to increase their cybersecurity efforts, harden their networks against attacks, and improve visibility to malicious…
Industry Feedback from Executive Order on Improving the Nation’s Cybersecurity
The recent signing of the Executive Order on Improving the Nation’s Cybersecurity has spurred much discussion among the industry. IIoT World asked for input from leading cybersecurity experts and organizations…
eBook: Manufacturing Cybersecurity Case Studies
For factories and manufacturers, the need for cybersecurity is urgent. This is due to the concerns arising from operation stoppages caused by security incidents, resulting in loss of revenue. Unlike…