What could an OT cyberattack cost you?
· Cybersecurity

What could an OT cyberattack cost you?

If there’s one thing every operator, plant manager and OT expert knows, it’s that downtime is never an option. While no company likes to have its IT systems and data on lockdown, there can be devastating consequences for an OT attack that shuts down production for mission-critical industries. 1) Jeopardizing human safety Arguably the most […]

Read more →
How will US sanctions on the group behind TRITON protect critical infrastructure?
· Cybersecurity

How will US sanctions on the group behind TRITON protect critical infrastructure?

In late October 2020, the US Federal Government announced plans to impose sanctions on a Russian research institute that has been linked with cyber-attacks. The institute is alleged to have played a part in building the customized tools used in the TRITON malware targeting Industrial Control Systems (ICS). These sanctions are part of a wider US Government […]

Read more →
Report Summary: Cyber Attacks on Smart Manufacturing Systems
· Cybersecurity

Report Summary: Cyber Attacks on Smart Manufacturing Systems

Smart manufacturing systems are designed and deployed under the assumption that they will be isolated from both the outside world and the rest of the corporate network. On one hand, this does not necessarily mean that remote attackers should not be considered: Remote attackers will try alternative, indirect routes (e.g. infected automation logic or software […]

Read more →
Maximize IIoT Device Profitability and Customer Satisfaction with Yocto
· Cybersecurity

Maximize IIoT Device Profitability and Customer Satisfaction with Yocto

To maximize IIoT device profitability and customer satisfaction, users can take a few simple steps to augment yocto’s robust platform with tooling to increase security and decrease update frequency, while still maintaining aggressive delivery timelines. Yocto is quickly becoming the de facto standard build environment for embedded devices. Its configurability and wide range of supported […]

Read more →
Protecting Smart Buildings from Cyber Attacks
· Cybersecurity

Protecting Smart Buildings from Cyber Attacks

It was an attack on a hospital like no other, reported the news in February 2016. The Hollywood Presbyterian Medical Center had been hacked. Its services were crippled. As emergency patients were diverted to other area hospitals, hospital administrators received an ominous message. Pay a ransom to get your hospital systems back. The hospital ultimately […]

Read more →
Attack Vectors in the… Trillions?
· Cybersecurity

Attack Vectors in the… Trillions?

The growing attack surface of the new Industry 4.0 internet is a big problem. On this everyone agrees. But underneath the headlines and the frequent “patch now” warnings from firewall vendors is a more ominous reality few are talking about: the exponential vector problem. Yes, the attack surface is huge and growing. 127 new devices per second are […]

Read more →
CEO Insights: Four major challenges in protecting ICS from cyber attacks
· CEO Insights

CEO Insights: Four major challenges in protecting ICS from cyber attacks

As part of the CEO Insights Series, IIoT World’s Managing Editor, Lucian Fogoros, interviews Indegy’s CEO, Barak Perelman, about the major challenges in protecting ICS from cyber attacks and the best defenses against cyber threats in Industrial Internet of Things era. Lucian Fogoros: What are the major challenges in protecting ICS from cyber attacks? Barak […]

Read more →