Trend Micro Cybersecurity Reference Architecture for Operational Technology
· Cybersecurity

Trend Micro Cybersecurity Reference Architecture for Operational Technology

The evolution of the Internet of Things (IoT) has made life a lot more convenient and productive for both consumers and businesses alike over past few years, but on the other side, cybersecurity is an emerging challenge. For automobile original equipment manufacturers (OEMs), Tier 1 suppliers, car dealers, service providers, car owners and drivers, cyberattacks […]

Read more →
Shifting Tides in IIoT Security
· Cybersecurity

Shifting Tides in IIoT Security

I’ve been writing about OT cybersecurity for a while and, although a consistent part of the message is that the overall level of risk is high and rising, some positive developments should be acknowledged.  In particular, the past couple of years has seen increasing awareness of the issues and growing attention from business leaders.  This […]

Read more →
Adhering to the NIST Cybersecurity Framework with the Indegy Platform
· Cybersecurity

Adhering to the NIST Cybersecurity Framework with the Indegy Platform

US national security depends on the reliability and continuous operations of the nation’s critical infrastructure. The increasing complexity and connectivity of critical infrastructure systems exposes them to cybersecurity threats which put their safety and reliability at risk. The National Institute of Standards and Technology (NIST) Framework was created through the collaboration of the government and […]

Read more →
9 questions you should ask before choosing a security vendor
· Cybersecurity

9 questions you should ask before choosing a security vendor

There are many companies that provide security products and services for IT and OT environments. Needless to say, selecting the right vendor is key to the success of cybersecurity implementation across the organization. To help you make the ideal choice, here are some questions you might want to consider when evaluating the security vendor options […]

Read more →
CXO Insights: ICS process data is the calling card for some of the most secured info on the planet
· CEO Insights

CXO Insights: ICS process data is the calling card for some of the most secured info on the planet

Industrial Control Systems (ICS) allow operators to monitor and control industrial processes, including those in manufacturing, power transmission, oil & gas, and other industries. You can find Industrial Control Systems in lots of different places – from a precise formulation of a particular drug, medicine to running the power grid to building or managing the […]

Read more →
Can blockchain address the Industrial IoT security?
· Cybersecurity

Can blockchain address the Industrial IoT security?

Possible ICS security solution from the sensor to the cloud It seems like nowadays everyone is talking about this new buzzword called “blockchain”. It’s all over the Internet! What is blockchain? What’s it used for? And how can it be helpful with Industrial IoT? In order to understand what blockchain is, let’s first discuss another […]

Read more →
15 predictions for ICS cybersecurity in 2018
· Cybersecurity

15 predictions for ICS cybersecurity in 2018

This year was one of the most intense in terms of cybersecurity attacks affecting industrial control systems. For the first time since Stuxnet, a malicious toolset called CrashOverride/Industroyer targeted physical systems. However, the most significant threat to ICS security in 2017 was ransomware attacks. The WannaCry and Petya attacks appear to have changed forever the […]

Read more →
Best Cybersecurity Practices for the IT/OT Environment
· Cybersecurity

Best Cybersecurity Practices for the IT/OT Environment

In the world of IT/OT cybersecurity, there is no silver bullet. What you can do in your organization is to minimize the attack surfaces and threat vectors, and be vigilant and proactive in your defense against adversaries. To that end, we suggest that you implement a multilayered defense-in-depth cybersecurity strategy and stop the cyber threat […]

Read more →
Preventing Malware Attacks with Network Security Monitoring Solutions
· Cybersecurity

Preventing Malware Attacks with Network Security Monitoring Solutions

Unless you’re sleeping you know that cybersecurity is the single largest threat to your network uptime. “2016 saw a host of new cybersecurity threats and breaches – there are currently 578.7 million malware programs in existence, with four to five new malware threats per second,” according to AV-TEST’s Security Report 2015/16. That number is projected to rise to more […]

Read more →
Defending ICS and SCADA Systems from Cyber Attacks
· Cybersecurity

Defending ICS and SCADA Systems from Cyber Attacks

As Operational Technologies (OT) for the Industrial Internet of Things (IIoT) proliferate and converge with enterprise IT systems, CSOs and CIOs need to assess the risks with their growing attack surface. Top of the list should be looking at the potential threats and cyber attacks emanating from the network, given the convergence of OT and […]

Read more →
Managing the Security Issues & Risks of Industrial IoT
· Cybersecurity

Managing the Security Issues & Risks of Industrial IoT

To many people, the Internet of Things (IoT) seems like a new concept. They run around with the idea that IoT is a recent collection of Wi-Fi-enabled Internet-accessible gadgets, from coffee makers, soda machines and refrigerators to Google Glass and FitBits®. Though these are fun toys with some usefulness, most deliver limited utility. These devices are placed on the Internet […]

Read more →