An Assessment of Presidential Executive Order 13920 – Securing the United States Bulk-Power System
· Cybersecurity

An Assessment of Presidential Executive Order 13920 – Securing the United States Bulk-Power System

I do not know what precipitated the issuance of the May 1st, 2020 Executive Order. However, this new Executive Order is long overdue, and addresses many longstanding concerns. The Executive Order demonstrates a high level of technical details and detailed knowledge of existing gaps and vulnerabilities in bulk power equipment and Operations including identifying a […]

Read more →
Cybersecurity and Productivity – What is Their Relationship?
· Cybersecurity

Cybersecurity and Productivity – What is Their Relationship?

Welcome to the Industrial Internet of Things (IIoT) data problem series.  The goal of this series is to help leaders understand the data problems that industrial businesses face when deploying IIoT networks. Cybersecurity in productivity was saved for last, as it is perhaps the most prevalent and relevant issue to many organizations. A recent Financial […]

Read more →
Maximize IIoT Device Profitability and Customer Satisfaction with Yocto
· Cybersecurity

Maximize IIoT Device Profitability and Customer Satisfaction with Yocto

To maximize IIoT device profitability and customer satisfaction, users can take a few simple steps to augment yocto’s robust platform with tooling to increase security and decrease update frequency, while still maintaining aggressive delivery timelines. Yocto is quickly becoming the de facto standard build environment for embedded devices. Its configurability and wide range of supported […]

Read more →
Working From Home? Here’s What You Need for Cybersecurity
· Cybersecurity

Working From Home? Here’s What You Need for Cybersecurity

There has been an influx of employees signing in remotely to corporate networks and using cloud-based applications. But this shift could also open doors to cybersecurity risks. Where should cybersecurity fit in? The current workplace reality is that, in response to the ongoing coronavirus (COVID-19) outbreak, many companies around the globe have rolled out work-from-home […]

Read more →
Industrial Cyber Security: Why IT & OT collaboration is no longer an option but a necessity
· Cybersecurity

Industrial Cyber Security: Why IT & OT collaboration is no longer an option but a necessity

Since the mid-1990s, many industrial companies have interconnected their industrial control systems (ICSs) to improve productivity, maintenance, and safety in the operational environment. Some of this interconnectivity was to  the Internet.  While, this connectivity helped to improved the efficiency, security was at best a minimal consideration. The lack of adequate security planning has resulted in […]

Read more →
Medical Device Safety and Security: Obvious but not easy to achieve
· Cybersecurity

Medical Device Safety and Security: Obvious but not easy to achieve

With accelerating technology innovation, medical devices are becoming more sophisticated and more connected. Consequently, as in most mission-critical systems, safety and security are two increasingly vital requirements in medical device design. In April 2018, the U.S. Food & Drug Administration (FDA) announced plans to increase regulatory powers over medical device safety, including cybersecurity. This paper […]

Read more →
Control system cybersecurity is being discussed but still with misunderstandings
· Cybersecurity

Control system cybersecurity is being discussed but still with misunderstandings

I attended a number of sessions at the February 24-27, 2020 RSA 2020 Cybersecurity Conference in San Francisco. One of the sessions really struck me as getting it right. The session I found most compelling was with Roy Gundy from Johnson and Johnson and Dawn Cappelli from Rockwell Automation. Roy identified that his definition of OT […]

Read more →
The validity of cybersecurity policies for control system environments
· Connected Industry

The validity of cybersecurity policies for control system environments

Control system cyber security is different than IT and requires an understanding of issues unique to control systems. It is time to discuss the validity of cybersecurity policies for control system environments. Cybersecurity policy has been based on preventing malicious attacks against IT data networks. IT cybersecurity has been a problem for more than 20 […]

Read more →
Supply Chain Economics and Cybersecurity
· Cybersecurity

Supply Chain Economics and Cybersecurity

Let’s face it, supply chains are complex and distributed. Operations matter, and for some it is truly a miracle how many coordinated parts come together into a seamless operation. In fact, some manufacturers have tens of thousands of suppliers, from raw materials to hardware to firmware to software and everything in between. As companies continually […]

Read more →
Cybersecurity and Data Concerns in 5G
· Cybersecurity

Cybersecurity and Data Concerns in 5G

For the advantages of 5G to be unlocked, ample preparation and planning are necessary. Looking at the changes 5G networks might bring about on an enterprise and its security is a good place to start. One of the first areas of 5G security concerns is the amount of data collected and how it is interpreted. […]

Read more →
Extend the Lifecycle of Embedded Systems with a Hypervisor
· Cybersecurity

Extend the Lifecycle of Embedded Systems with a Hypervisor

Multiple embedded systems are at the heart of medical devices, transportation systems, automobiles, heavy equipment, and industrial robotics. In complex systems like these, a hypervisor provides the supervision to safely and reliably allowing separate functional software areas to share common hardware and resources. When it comes time to develop a new version of a system, […]

Read more →
AcceliGOV –  Cities Compete for Protection from Cyber Attacks
· Smart Cities

AcceliGOV – Cities Compete for Protection from Cyber Attacks

As the formidable threat of cybersecurity looms over the majority of the world’s municipal governments, Leading Cities launched AcceliGOV. This global competition offers municipalities around the world the chance to compete for a pre-paid pilot of a globally sourced, expert-vetted cybersecurity solution. Interested cities may complete a brief application found at AcceliGOV.com by March 31st. AcceliGOV […]

Read more →