What you need to know about Cybersecurity when adopting IIoT solutions
· Cybersecurity

What you need to know about Cybersecurity when adopting IIoT solutions

According to  an article published by Trend Micro: “in 2018, digital extortion will be at the core of most cybercriminals’ business model and will propel them into other schemes that will get their hands on potentially hefty payouts. Vulnerabilities in IoT devices will expand the attack surface as devices get further woven into the fabric […]

Read more →
The ICS Security considerations checklist
· Cybersecurity

The ICS Security considerations checklist

As you evaluate ICS cyber security solutions to protect your critical infrastructure from threats, there are a few criteria your team must consider throughout the process. We’ve compiled a checklist to help you select a solution that will enable both your ICS engineers and security personnel to secure and control your critical networks. The technology […]

Read more →
Hacking Level 0,1 devices can be more significant than Stuxnet
· Cybersecurity

Hacking Level 0,1 devices can be more significant than Stuxnet

Last week, the cyber security focus was on the four natural gas pipeline companies that had their electronic data interfaces, not control systems, hacked. However, from a control and safety system perspective, I believe the more important disclosure was the ICS CERT vulnerability disclosure of the Moxa serial-to-Ethernet convertors (gateways). This is because these types […]

Read more →
TPM – a Powerful, Inexpensive Security Building Block
· Cybersecurity

TPM – a Powerful, Inexpensive Security Building Block

There are two worlds of computer security – high-end systems and then everything else.   Both high- and low-end systems typically employ “top-down” defenses to harden their attack surfaces.  These are “software-only” security techniques. High-end and specialized systems have the additional protection of “bottom-up” defenses in the form of Hardware Security Modules (HSMs).  HSMs sequester secrets […]

Read more →
Is OT Cybersecurity Better Bolted-On or Designed-In?
· Cybersecurity

Is OT Cybersecurity Better Bolted-On or Designed-In?

Power grid outages driven by malware, dam control system attacks, vehicle onboard system hijacking:  recent incidents like these show how critical cybersecurity has become in connected operational technology. But if you think OT is “just IT in an industrial environment,” then think again. The worlds of operational technology and information technology are fundamentally different. A […]

Read more →
IIC: The Endpoint Security Best Practices White Paper
· Cybersecurity

IIC: The Endpoint Security Best Practices White Paper

The Industrial Internet Consortium published today the Endpoint Security Best Practices white paper. The intended audience includes industrial equipment manufacturers, integrators, and industrial equipment owners and operators. All can benefit by obtaining a clear description of what countermeasures and controls are generally recommended for each level of security. Equipment manufacturers and integrators can define which security level […]

Read more →
Four Advantages of Hiring a Specialized Security Partner for your Smart Manufacturing Processes
· Cybersecurity

Four Advantages of Hiring a Specialized Security Partner for your Smart Manufacturing Processes

Cyberattacks against financial companies such as JPMorgan Chase and Citigroup and vendors such as Target, eBay, and Home Depot have received so much media attention these past years. Unknown to many, smart manufacturing companies are also not immune to cyberattacks. According to Deloitte, smart manufacturers are now being targeted not just by random hackers and […]

Read more →
Three Ways SDN Helps to Solve Industrial IoT’s Undiscovered Security Problems
· Uncategorized

Three Ways SDN Helps to Solve Industrial IoT’s Undiscovered Security Problems

Even before the major denial-of-service attack that took down power in the Ukraine in December 2015, industrial systems experts had been growing more restive about the mounting insecurities of these mission critical systems. That attack brought significant awareness to this issue. In the  18 months since then we’ve seen other similar examples of what happens […]

Read more →
Securing IoT Devices and Traffic between IoT Sensors and Cloud Analytics
· Cybersecurity

Securing IoT Devices and Traffic between IoT Sensors and Cloud Analytics

It is well documented that IoT devices have introduced new security risks. Most IoT devices must interface to cloud based management and analytics engines and therefore support a TCP/IP stack for this communication. Our IoT endpoint software is designed to augment a device’s TCP/IP stack with very little overhead, providing authentication to the cloud services. […]

Read more →
Two key capabilities in the advancement of IoT network security and cyber defense
· Cybersecurity

Two key capabilities in the advancement of IoT network security and cyber defense

Nowadays, cyber-attacks are automated but still under human direction and control, and therefore cyber defenses must also be automated to have any chance of protecting cyber and digital assets from both the automated attacks and the human element behind those attacks. Detecting and thwarting attacks and cleaning up the aftermath is a difficult task. Most […]

Read more →
Major Cybersecurity Vulnerabilities in ICS Mobile Applications
· Cybersecurity

Major Cybersecurity Vulnerabilities in ICS Mobile Applications

Two years ago, mobile technologies were widespread, but IoT mania was only beginning. Today, no one is surprised at the appearance of an IIoT. The idea of putting your logging, monitoring, and even supervisory/control functions in the cloud does not sound as crazy as it did several years ago. If you look at mobile application […]

Read more →