Are We Doing Enough to Secure the US Power Grid?
· Cybersecurity

Are We Doing Enough to Secure the US Power Grid?

An Executive Order from US President Donald Trump in May this year overhauled the backbone of the nation’s electricity infrastructure, highlighting gaps and vulnerabilities in the operations of power systems and bulk power equipment, to attacks by hackers, terrorists and other state adversaries. So, what can be done to secure the US power grid? The […]

Read more →
IIoT World Days Track: ICS Security – Risks, Strategies and Solutions
· Augmented Reality

IIoT World Days Track: ICS Security – Risks, Strategies and Solutions

Track Sponsored by aDolus This track, originally presented at IIoT World Days on June 30, 2020, covers 4 presentations from industry leaders in ICS Security: Five Blind Men and the Elephant called ICS Supply Chain Security The Road to Industrial IoT Security Automated ICS Vulnerability Assessment Identifying Compromises Through Device Profiling Using Open Source Tools […]

Read more →
Rogue Automation: Vulnerable and Malicious Code in Industrial Programming
· Cybersecurity

Rogue Automation: Vulnerable and Malicious Code in Industrial Programming

In this White Paper, previously unknown design flaws that malicious actors could exploit to hide malicious functionalities in industrial programming for robots and other automated manufacturing machines are revealed. Since these flaws are difficult to fix, enterprises that deploy vulnerable machines could face serious consequences. An attacker could exploit them to become persistent within a […]

Read more →
IIoT World Days Panel: Industry 4.0 and Cybersecurity Challenges
· Cybersecurity

IIoT World Days Panel: Industry 4.0 and Cybersecurity Challenges

Panel Sponsored by and The Industry 4.0 revolution brings with it a new operational risk for connected, smart manufacturers and digital supply networks: cyber. Industrial Cybersecurity should be an integral part of the strategy, design, and operations from the beginning of any new connected, Industry 4.0–driven initiative. In light of Industry 4.0, our expert line […]

Read more →
[White Paper] Three Steps to Keep Smart Factory Operations Running
· Connected Industry

[White Paper] Three Steps to Keep Smart Factory Operations Running

For factories and manufacturers, the need for cybersecurity is urgent. This is due to the concerns arising from operation stoppages caused by security incidents, resulting in loss of revenue. Unlike enterprise IT, system administrators face several issues within smart factory security, namely difficult to eliminate vulnerabilities, the spread of malware, and flat network configurations. Furthermore, […]

Read more →
IIoT World Days Track – ICS Security: Bringing Order to ICS Cyber Chaos
· Cybersecurity

IIoT World Days Track – ICS Security: Bringing Order to ICS Cyber Chaos

Track Sponsored by and This track, originally presented at IIoT World Days on July 1, 2020, covers 5 presentations from industry leaders in ICS Security: ICS Security Bringing Order to ICS Cyber Chaos Addressing the Business and Cyber Security Challenges on the New Industrial 4.0 Convergence Creating and Performing a Cybersecurity Tabletop Exercise CMMC, the […]

Read more →
The Wake-Up Call for Stronger Authentication: California’s IoT Bill SB-327
· Cybersecurity

The Wake-Up Call for Stronger Authentication: California’s IoT Bill SB-327

Along with the California Consumer Protection Act (CCPA), the cybersecurity law CA SB-327 known as the “IoT bill” went into effect January 1, 2020, with enforcement beginning July 1, 2020. While the CCPA, which is focused on personal data control and privacy, has grabbed most of the headlines, the lesser known Internet of Things bill is focused on […]

Read more →
[White Paper]  The Past, Present and Future of Cybersecurity for Embedded Systems
· Cybersecurity

[White Paper] The Past, Present and Future of Cybersecurity for Embedded Systems

Learn how evolving threats are changing the game for embedded device manufacturers and what the future of cybersecurity looks like for the industry in this white paper. The only system that’s safe from cyberthreats is one that’s never powered on. While this is an overstatement meant to highlight the seriousness of security threats that surround […]

Read more →
Securing IT and OT in Industrial and Manufacturing Environments
· ICS Security

Securing IT and OT in Industrial and Manufacturing Environments

For many years, industrial control systems—often called “Operational Technology” or OT—have been relatively safe from cyber attacks. The control and telemetry systems used in industrial plants and manufacturing environments were typically placed on isolated or “air gapped” communication networks, and the systems themselves were based on highly specialized operating systems which were difficult to attack […]

Read more →
Smart Factory Case Studies
· Cybersecurity

Smart Factory Case Studies

This summary contains three Smart Factory success stories in IoT manufacturing, from the Semiconductor, Manufacturing and Electrical Engineering industries.  They describe how Trend Micro expertise and solutions addressed a variety of business challenges, including security solutions for cloud infrastructures, connected threat defense and the need for vendor support, visibility across the IT environment and keeping […]

Read more →
Ensuring cybersecurity resilience in an ultra-connected world
· Cybersecurity

Ensuring cybersecurity resilience in an ultra-connected world

The development of the Internet of Things (IoT), Artificial Intelligence (AI), the cloud and big data have enabled devices that started out as unbelievable concepts to become a reality. From a consumer standpoint, these ever-increasing trends are often taken for granted as people become accustomed to smart devices becoming more commonplace in all aspects of […]

Read more →
Report Summary: Cyber Attacks on Smart Manufacturing Systems
· Cybersecurity

Report Summary: Cyber Attacks on Smart Manufacturing Systems

Smart manufacturing systems are designed and deployed under the assumption that they will be isolated from both the outside world and the rest of the corporate network. On one hand, this does not necessarily mean that remote attackers should not be considered: Remote attackers will try alternative, indirect routes (e.g. infected automation logic or software […]

Read more →