The Recycling of Industrial Cyber-Attacks
· Cybersecurity

The Recycling of Industrial Cyber-Attacks

How the Malware Dumpster Became Post-industrial Landfill For companies involved in critical infrastructure or any facet of manufacturing processes, one of the big action items today is securing OT. For the very first time, the security of the industrial computers (which run discrete and continuous processes such as PLCs, DCSs and HMIs) has eclipsed the […]

Read more →
[Infographic] 7 Most Unsafe Gaps for Industrial Cybersecurity
· Cybersecurity

[Infographic] 7 Most Unsafe Gaps for Industrial Cybersecurity

Although WannaCry and Petya did not specifically target industrial networks, they did reach them. Many IT leaders and their board of directors responded in panic. The incidents raised the profile of how malware can move to ICS environments. It opened up perspective that if bad actors wanted to launch a ransomware attack on industrial networks, they clearly could. Protect Your Entire Network – that […]

Read more →
5G is Coming – IoT Security Remains an Unanswered Challenge
· Cybersecurity

5G is Coming – IoT Security Remains an Unanswered Challenge

Why IoTs have created a security crisis and strained the communications infrastructure along the way. Quick Hit Points:  Mobile phone markets are completely saturated, yet the IoT market, in its infancy, still outnumbers mobile phones 2:1 (16 billion vs. 8 billion devices) IoTs are purpose-built devices with a lifespan of 8 to 20 years and […]

Read more →
IIoT is the Firewall Chasm: Airwall is the Solution
· Cybersecurity

IIoT is the Firewall Chasm: Airwall is the Solution

Network Effects are Powerful Since the early days of TCP/IP, connectivity-driven convergence has created waves of multi-billion dollar markets, seemingly out of thin air. All of the successes thus far have had one thing in common: they created unprecedented network effects. The 1990s ushered in the power of network effects. New levels of connectivity and […]

Read more →
The latest trends in IIoT micro-segmentation in the Smart Buildings
· Smart Buildings

The latest trends in IIoT micro-segmentation in the Smart Buildings

Find out how Penn State securely connected and isolated their building controls across 640 buildings in record time, using IIoT micro-segmentation. Download this case study sponsored by Tempered Networks.  Tom Walker, system design specialist, leads the FAS group which is responsible for maintaining the high availability, integrity, and confidentiality of building systems supporting nearly 150,000 students and University employees. […]

Read more →
How to Regulate Cybersecurity of the Internet of Things
· Cybersecurity

How to Regulate Cybersecurity of the Internet of Things

I had the honor of speaking on IoT security policy at the annual CyberNextDC conference organized by the Cybersecurity Coalition.  As the number of connected devices grows and these devices are increasingly used to perpetrate “botnets”, global policymakers are under pressure to regulate the cybersecurity of the Internet of Things (IoT).  Below are just a […]

Read more →
Protecting Smart Buildings from Cyber Attacks
· Cybersecurity

Protecting Smart Buildings from Cyber Attacks

It was an attack on a hospital like no other, reported the news in February 2016. The Hollywood Presbyterian Medical Center had been hacked. Its services were crippled. As emergency patients were diverted to other area hospitals, hospital administrators received an ominous message. Pay a ransom to get your hospital systems back. The hospital ultimately […]

Read more →
[White paper] A new approach to cyber defense automation
· Cybersecurity

[White paper] A new approach to cyber defense automation

Cyber-attacks are a daily occurrence. While the largest attacks make intermittent headlines, the attacks as a whole are unrelenting. Day after day, hour after hour, our computer and network infrastructure, both enterprise and personal, are probed, scanned and attacked in attempts to penetrate and gain a foothold from which subsequent attacks can be staged.  The […]

Read more →
Simple NIST cybersecurity Compliance for Manufacturing
· Cybersecurity

Simple NIST cybersecurity Compliance for Manufacturing

As industrial technology advances, manufacturers are increasingly using cloud, data analytics and mobile to improve their connectivity and infrastructure. This means a larger attack surface which creates a rich target for threats that cause physical damage, facility downtime, and breaches of customer data and intellectual property. To help manufacturing organizations reduce cybersecurity risk, NIST published […]

Read more →
Golidlocks problem of mobile device security in organizations
· Cybersecurity

Golidlocks problem of mobile device security in organizations

Usability vs. Security The “Goldilocks and the three bears” story begins with a girl tasting porridge. The first bowl is too hot, the second is too cold, and the third is “just right.” This article considers mobile device security for organizations. The theme is trade-offs between usability of the device and security for confidential organizational […]

Read more →
How to Actively Secure Your Industrial Environment In the New Era of Distrust
· Cybersecurity

How to Actively Secure Your Industrial Environment In the New Era of Distrust

Today’s sophisticated Operations Technology (OT) environments have a large attack surface with numerous attack vectors. Without complete coverage, the likelihood of getting attacked is not a matter of ‘if’; it’s a matter of ‘when’. Security for OT has gained significant attention due to a confluence of events. Up until only recently the IT infrastructure played front […]

Read more →
Attack Vectors in the… Trillions?
· Cybersecurity

Attack Vectors in the… Trillions?

The growing attack surface of the new Industry 4.0 internet is a big problem. On this everyone agrees. But underneath the headlines and the frequent “patch now” warnings from firewall vendors is a more ominous reality few are talking about: the exponential vector problem. Yes, the attack surface is huge and growing. 127 new devices per second are […]

Read more →