Cybersecurity for Shared Cloud Environments
· Cybersecurity

Cybersecurity for Shared Cloud Environments

In its recent Cloud Workload Protection Platform (CWPP) research note, Gartner identified memory exploit protection as an essential component of any organization’s CWP strategy (Gartner, Cloud Workload Protection Platforms, 2020):  “Exploit Prevention/Memory Protection–application control solutions are fallible and must be combined with exploit prevention and memory protection capabilities…”—Gartner CWPP 2020 Cybersecurity Considerations for the Cloud Cloud deployments […]

Read more →
Security Risks Are Slowing IT-OT Convergence
· Cybersecurity

Security Risks Are Slowing IT-OT Convergence

Fortinet has worked with Forrester Consulting for a third time to check in on security trends affecting those who manage and maintain critical infrastructure—including the industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems that manage everything from factories to refineries to telecommunications infrastructure. Based on a global survey, the report identifies […]

Read more →
Protecting Traditional Stand Alone OT Systems As They Are Introduced To The IIoT
· Cybersecurity

Protecting Traditional Stand Alone OT Systems As They Are Introduced To The IIoT

Re-Emagineering the CyberSecurity driven convergence of OT to IIOT The exploitation and sabotage of resources has been a concern to mission critical operations since the dawn of the industrial age. With the advancement of Information Technology (IT), opportunities to compromise, corrupt and disable networks and systems have exponentially grown, creating new development of malicious mechanisms. […]

Read more →
Cybersecurity Tactics to Prevent Ransomware
· Cybersecurity

Cybersecurity Tactics to Prevent Ransomware

Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files unless a ransom is paid. More modern ransomware families, collectively categorized as crypto-ransomware, encrypt certain file types on infected systems and forces users to pay the ransom through certain […]

Read more →
Cybersecurity Tactics to Reduce ICS Software Supply Chain Risk
· Cybersecurity

Cybersecurity Tactics to Reduce ICS Software Supply Chain Risk

Supply chain attacks like the recent SolarWinds hack are now front-page news, and cybersecurity steps must be taken to reduce the risk these attacks pose to critical systems. A platform that enables end users to manage the security of their ICS/OT endpoints down to vulnerabilities in hidden subcomponents is a necessity given the increased capabilities […]

Read more →
The Clock is Ticking for a New Cyber Security Strategy
· Cybersecurity

The Clock is Ticking for a New Cyber Security Strategy

President Biden is walking into an embattled and in some ways grim cyber security picture. As we know, the end of 2020 brought to our attention a months-long global cyber-espionage campaign, The broader public will almost certainly never know the full scope of Solarwinds or its impact on national security. While we have seen ongoing […]

Read more →
Digital Transformation: A One-Two Punch to Empower Employees and Protect Data
· Connected Industry

Digital Transformation: A One-Two Punch to Empower Employees and Protect Data

As the COVID-19 pandemic continues to impact business and the economy worldwide, companies in every industry are using a critical eye to prioritize their operations amidst shrinking budgets and a catalog of unknowns. This includes exploring automation technologies that can protect and even future-proof essential operations in an environment of fewer people, social distancing and […]

Read more →
Creating a Comprehensive Framework to Protect Operational Technology Assets
· Cybersecurity

Creating a Comprehensive Framework to Protect Operational Technology Assets

The ability to remotely manage systems including HVAC units, vehicle fleets, manufacturing equipment and other operational technologies (OT) is seen as a tremendous time and money saver. However, a failure to properly protect OT assets can lead to data theft, loss of remote management and an overall danger to those working in or around them. […]

Read more →
[White Paper] Operational Technology Cybersecurity
· Cybersecurity

[White Paper] Operational Technology Cybersecurity

The purpose of control system cybersecurity is to protect the control systems and the processes they monitor and control from electronic threats — that is, to “keep lights on and water flowing.” Networks are a support function in the overall objective of safety, reliability, and productivity — that is, to optimize the processes. What makes […]

Read more →
Insights into WP.29 and the Automotive Sector
· Cybersecurity

Insights into WP.29 and the Automotive Sector

Interview by Greg Orloff, Senior Analyst and CBDO with IIoT World and Ian Todd, IoT Practice Lead, Security Services with BlackBerry on WP.29  Visit this link for more information on WP.29 The UNECE World Forum for Harmonization of Vehicle Regulations (WP.29) is a unique worldwide regulatory forum within the institutional framework of the UNECE Inland […]

Read more →
Industrial IoT Cybersecurity: Top Questions, Key Insights
· Cybersecurity

Industrial IoT Cybersecurity: Top Questions, Key Insights

Industrial and ICS Cybersecurity is a hot topic in the IoT context. Recent market research shows, IoT Devices of nearly 80% of manufacturing organizations experienced a cyberattack, costing $300K on average. Cybersecurity has also been slowing IoT adoption in the industrial sector. Today, many questions around IIoT Security are routinely raised by business leaders and […]

Read more →
[White Paper] Strategic Investments to Secure Smart Manufacturers
· Cybersecurity

[White Paper] Strategic Investments to Secure Smart Manufacturers

Security is undergoing a digital transformation in the manufacturing industry. As the fusion of the cyber world and the physical world progresses, various security issues are mounting. Manufacturing executives must view security as a management issue, not as a system issue. Is cybersecurity a cost or an investment? Smart Manufacturers and the Convergence of IT […]

Read more →