What you need to know about Cybersecurity when adopting IIoT solutions
According to an article published by Trend Micro: “in 2018, digital extortion will be at the core of most cybercriminals’ business model and will propel them into other schemes that…
An effective cybersecurity strategy for an ICS environment should apply a layered protection
There are two sides to the cybersecurity fence when addressing threats and other concerns. The first side is what we’re most familiar with in corporate IT or Information Technology (IT).…
9 questions you should ask before choosing a security vendor
There are many companies that provide security products and services for IT and OT environments. Needless to say, selecting the right vendor is key to the success of cybersecurity implementation…
Best Cybersecurity Practices for the IT/OT Environment
In the world of IT/OT cybersecurity, there is no silver bullet. What you can do in your organization is to minimize the attack surfaces and threat vectors, and be vigilant…
8 technologies that an organization can adopt to help address its cybersecurity challenges
In defining policies and procedures around the implementation and management of security controls in an enterprise environment, the organization is advised to adopt a cybersecurity framework to overcome challenges. This…
Four most hard to solve IIoT security issues
According to a forecast by Gartner, the number of IoT devices in use will reach 8.4 billion in 2017 and grow to a staggering 20.4 billion by 2020, and the…
[Whitepaper] Integrating Security Into the IoT Strategy in the New Converged Environment
Consumers want their work, home and mobile devices to communicate together to provide information that was previously not available from isolated systems. This desire is at the root of the…
Richard Ku, SVP of Commercial IoT Business & Market Development
Richard Ku has been involved in Cyber Security for over 28 years, serving as a threat researcher and engineer. He has managed and developed many security products and services across different…
Industrial Robots Gone Rogue: Staying Ahead of Robot Cybersecurity Vulnerabilities
If you’re following industrial cyber security trends you know that industrial networks, endpoints and control systems typically have inherent weaknesses that make them insecure and vulnerable to compromise through digital…
Industrial Cyber Security: Why IT & OT collaboration is no longer an option but a necessity
Since the mid-1990s, many industrial companies have interconnected their industrial control systems (ICSs) to improve productivity, maintenance, and safety in the operational environment. Some of this interconnectivity was to the…
Building the Next Generation of Smart PLCs With the ctrlX CORE and InfluxDB
Program Logic Controllers (PLCs) have played an integral role in industrial automation since their initial creation during the 1960s. Since then, we’ve seen incremental improvements to their form and function…
Real-Time Anomaly Detection at the Edge using EmbeddedAI and IoT
The world is surrounded of problems to solve at the same time companies need to use innovation to offer new products and new services for their customers. There are several…