Working From Home? Here’s What You Need for Cybersecurity
There has been an influx of employees signing in remotely to corporate networks and using cloud-based applications. But this shift could also open doors to cybersecurity risks. Where should cybersecurity…
Industrial Cyber Security: Why IT & OT collaboration is no longer an option but a necessity
Since the mid-1990s, many industrial companies have interconnected their industrial control systems (ICSs) to improve productivity, maintenance, and safety in the operational environment. Some of this interconnectivity was to the…
Cybersecurity and Data Concerns in 5G
For the advantages of 5G to be unlocked, ample preparation and planning are necessary. Looking at the changes 5G networks might bring about on an enterprise and its security is…
Real Threats Logs From a Smart Factory Honeypot
Trend Micro just published the results of a six-month honeypot imitating an industrial factory. The highly sophisticated Operational Technology (OT) honeypot attracted fraud and financially motivated exploits. The six-month investigation…
Cybersecurity Predictions for 2020
The year 2020 marks the transition to a new decade, and recent notable events and trends signify a similar changeover in the threat landscape. Cybersecurity in 2020 and beyond will…
ICS Security Resources to Download
10 White papers and case studies on ICS cybersecurity How to implement baseline security measures for every ICS organization sponsored by ABB For manufacturers, managing the supply chain from…
How would you secure over 10 million IIoT devices?
Industrial IoT (IIoT) devices will comprise the majority of the billions of IoT devices deployed over the next decade. How will the information security market meet this onslaught of technology?…
[Research] Securing Smart Factories in the Era of Industry 4.0
Adopting Industry 4.0 means not only interconnecting IT and OT networks to build smart factories; it also means having shared responsibilities between IT administrators and OT engineers. These include accounting…
MQTT and CoAP: Security and Privacy Issues in IoT and IIoT Communication Protocols
Machine-to-machine (M2M) communication protocols, which enable machines to “talk” with one another so that commands are communicated and data is transmitted, are indispensable to applications and systems that make use…
Impact to large-scale implementations: Smart factories and smart cities
In this article we discuss how insecure deployments and the lack of well-defined security in M2M technology can be abused to turn into unforeseen problems in critical and large-scale environments…
Cultivating Security in the Food Production Industry
In the food production industry, high-tech tools and systems are being used to optimize production conditions. But new technology brings new challenges and risks. The world population is expected to…