Identifying Compromises Through Device Profiling
· Cybersecurity

Identifying Compromises Through Device Profiling

The Internet and our local networks have the ability to handle an amazing quantity of connections simultaneously. That strength leads to a problem when we’re trying to detect malicious traffic: how can we tell when one of our systems is sending traffic that it shouldn’t? In this article, I’ll show you how to detect these […]

Read more →
[New Report] Cybersecurity for smart factories
· Cybersecurity

[New Report] Cybersecurity for smart factories

Almost half (40%) of manufacturers surveyed recently by Deloitte and the Manufacturers Alliance for Productivity & Innovation (MAPI) said their operations were impacted by a cyber incident in the past 12 months, and yet one in four have not performed a cyber risk assessment in the last year. This preparedness gap is becoming increasingly striking as manufacturers adopt more Smart […]

Read more →
Driving Through the Maze of Cyberthreats Within the Automotive Industry
· Cybersecurity

Driving Through the Maze of Cyberthreats Within the Automotive Industry

Any connected device can be compromised. When we think of vulnerable devices, we immediately think of our phones, laptops, IoT devices, and even enterprise databases. We are moving into a world where our transportation system – cars, trucks, traffic lights, and trains – are becoming vulnerable as well. Before we go much further with this […]

Read more →
Facility Managers Guide to Building Systems and Cybersecurity
· Cybersecurity

Facility Managers Guide to Building Systems and Cybersecurity

How to Assure Vendors Establish and Use a Cybersecurity Hygiene Don’t look now, but mainstream business leaders are learning that building systems may be the single biggest block of cybersecurity vulnerability in corporate America. Facility Managers, if you are one, can no longer be unaware, nor should they use traditional approaches to protect their turf […]

Read more →
Trend Micro teams up with Baker Hughes to address industrial cybersecurity challenges
· Cybersecurity

Trend Micro teams up with Baker Hughes to address industrial cybersecurity challenges

Trend Micro, a global leader in cybersecurity solutions, announced that it will collaborate with Baker Hughes’ Nexus Controls operational technology (OT) security experts through a strategic framework agreement, signed in late 2019. Together the companies aim to provide comprehensive, industry leading guidance and support for enterprises running critical OT environments. The Industrial Internet of Things (IIoT) […]

Read more →
Is OT security ready for the next wave of cybercrime?
· Cybersecurity

Is OT security ready for the next wave of cybercrime?

Forrester’s Predictions 2020: The Internet of Things report has an eye-opening forecast on cybercrime for the coming year – an IoT prediction that demands that we collectively consider how to strengthen OT security. We cannot close the door on connectivity’s many benefits. It’s clear that connectivity across people, assets, and systems empowers us to make […]

Read more →
‘Cybersecuring’ Smart Cities
· Smart Cities

‘Cybersecuring’ Smart Cities

‘Cybersecuring’ Smart Cities Are the fears of the public sector holding back progress and opportunities for improved quality of life created by smart cities? After more than a decade of exploration, discussion and advancement, the term ‘smart city’ has come to have slightly different definitions depending on the source. However, though the term is fairly […]

Read more →
[Use Case] Smart Grid and Distribution System Cybersecurity Protection
· Cybersecurity

[Use Case] Smart Grid and Distribution System Cybersecurity Protection

Smart grid is an evolving new power system framework with Information and Communication Technology (ICT) driven power equipment and a massively layered structure. The new generation sensors, smart meters and electronic devices are integral components of smart grid. However, the upcoming deployment of smart devices at different layers followed by their integration with communication networks […]

Read more →
Real Threats Logs From a Smart Factory Honeypot
· Cybersecurity

Real Threats Logs From a Smart Factory Honeypot

Trend Micro just published the results of a six-month honeypot imitating an industrial factory. The highly sophisticated Operational Technology (OT) honeypot attracted fraud and financially motivated exploits. The six-month investigation revealed that unsecured industrial environments are primarily victims of common threats. The honeypot was compromised for cryptocurrency mining, targeted by two separate ransomware attacks, and […]

Read more →
5 Game Changers for Facilities Managers and Cybersecurity
· Cybersecurity

5 Game Changers for Facilities Managers and Cybersecurity

The year 2019 produced important game changes that help Facilities Managers wage war against cyber attacks on Building Systems. Prior to 2019, Facilities stood on the sideline, hoping the IT department would protect their systems, which did not happen (and may never happen) for reasons explained below. With cybersecurity increasing the stakes for Facilities, these […]

Read more →
A New Approach to IIoT Security
· Cybersecurity

A New Approach to IIoT Security

As more operational technology (OT) devices and industrial control systems (ICSs) are connected to information technology (IT) systems over the Internet, the attack surface expands to billions of insecure devices, many of which cannot be patched. That in turn creates a massive population of new attack vectors against physical infrastructure – from power and water […]

Read more →
Cybersecurity Predictions for 2020
· Cybersecurity

Cybersecurity Predictions for 2020

The year 2020 marks the transition to a new decade, and recent notable events and trends signify a similar changeover in the threat landscape. Cybersecurity in 2020 and beyond will have to be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to advancing technological developments and global threat intelligence — only […]

Read more →