Six criteria to consider when evaluating industrial cybersecurity solutions
· Cybersecurity

Six criteria to consider when evaluating industrial cybersecurity solutions

Converged infrastructure is only as valuable as it is secure. Attacks on critical infrastructure have grown in frequency and sophistication as bad actors, including nation states, seek to disrupt or disable essential services or to gather intelligence into strategic operations and planning.  The damages of a breach have been well documented. Billions of records have […]

Read more →
Use a Zero Trust Approach to Protect Your Smart Cities Projects from Hackers
· Cybersecurity

Use a Zero Trust Approach to Protect Your Smart Cities Projects from Hackers

Smart cities projects continue to gain momentum, given the need to address our aging infrastructure while enhancing the quality of life for both residents and visitors. New Internet of Things (IoT) and next generation network technologies like 5G enable smart parking, better traffic and mass transit control, smart lighting systems, and crime prevention. At the […]

Read more →
Securing our Energy Future
· Cybersecurity

Securing our Energy Future

ENERGY! – It’s the most vital, indispensable resource for sustaining and advancing humankind. Much as Oxygen is essential for all life on earth, Electricity – the foremost and primary useful energy form – is the core enabler of all technology development since the industrial revolution, and key to the sustainability of modern civilization. The future […]

Read more →
The Digital Cybersecurity Paradox
· Cybersecurity

The Digital Cybersecurity Paradox

In 5 years there will be 75 billion devices connected to the internet, perhaps a few billion insecure and unpatchable. An estimated 2 billion run VxWorks and perhaps a couple hundred million of those will not be patched in any reasonable length of time. About 200 million Internet-connected devices—some that may be controlling elevators, medical […]

Read more →
In Security, Process is as Reliable as Luck
· Cybersecurity

In Security, Process is as Reliable as Luck

Lately, I have seen two common themes whenever IoT security is brought up; 1) complete acceptance that IoTs pose unique security challenges, and 2) how they have an IT/OT collaboration process to address them. Everybody knows what IT is, but as a reminder, OT, or operationalized technologies, are network/Internet-connected technologies whose primary function is not […]

Read more →
Mind the Gap – a Road to IT/OT Alignment
· Cybersecurity

Mind the Gap – a Road to IT/OT Alignment

Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. In a very standard environment, thousands of devices exist and are increasingly being connected via the Industrial Internet of Things (IIoT). This creates new challenges in securing industrial environments specifically by making cyber-security threats even more difficult to detect, investigate […]

Read more →
· Digital Disruption

A Cloud Based Alternative to Traditional SCADA

What is SCADA?  Supervisory Control and Data Acquisition (SCADA) systems have been in existence three decades and have long been considered the de facto method for interfacing with PLCs and providing alarming, logging, trending, and operator interface functionality.  Today most SCADA packages include web and mobile interfaces and tout these features as their Industrial Internet […]

Read more →
[Cybersecurity] Ensuring Business Continuity with Blockchain Distributed Storage
· Cybersecurity

[Cybersecurity] Ensuring Business Continuity with Blockchain Distributed Storage

One of DARPA’s original design features of the Internet was to ensure connectivity is resilient to partial failures. This was achieved through decentralization and recovery from failures. With more and more data stored online, we need a similarly robust infrastructure. Any ICT department would be interested in preserving their data during and after network compromise. […]

Read more →
The Cybersecurity Implications of Infrastructure Modernization
· Cybersecurity

The Cybersecurity Implications of Infrastructure Modernization

The adoption of new technologies in oil and gas facilities is a dual-edged sword. On one side, there are the obvious benefits of implementing industrial internet of things (IIoT) devices to improve efficiencies and reduce operational costs. On the other side, there are inherent risks associated with upgrading systems and with the cybersecurity infrastructure. Cybersecurity […]

Read more →
Cybersecurity Q&A with ABB
· Cybersecurity

Cybersecurity Q&A with ABB

According to a study by Inmarsat Enterprise that surveyed 125 businesses across the energy industry, 74% of respondents admitted that their processes to combat cybersecurity threats were lacking, while 73% of them reported that more could be done to protect against data mishandling.   However, despite recognizing the enhanced security threats of industrial IoT, just 43% have invested in […]

Read more →
How would you secure over 10 million IIoT devices?
· Cybersecurity

How would you secure over 10 million IIoT devices?

Industrial IoT (IIoT) devices will comprise the majority of the billions of IoT devices deployed over the next decade. How will the information security market meet this onslaught of technology? The consumer market is not a useful guide for this analysis. Consumers buy in small quantities and choose to deploy information security tools piecemeal. Few […]

Read more →
[Research] Securing Smart Factories in the Era of Industry 4.0
· Cybersecurity

[Research] Securing Smart Factories in the Era of Industry 4.0

Adopting Industry 4.0 means not only interconnecting IT and OT networks to build smart factories; it also means having shared responsibilities between IT administrators and OT engineers. These include accounting for assets such as equipment, underlying platforms, and protocols or services in use; assessing them for their criticality in the overall operations; and applying the […]

Read more →