Cybersecurity for Energy and Utilities
· Connected Industry

Cybersecurity for Energy and Utilities

Don’t miss out on the opportunity to gain valuable insights into the cybersecurity landscape of the energy and utilities sector by watching the recorded version of our engaging panel discussion. In this thought-provoking session, esteemed experts delve into the unique challenges faced by the industry, focusing on safeguarding sensitive information, preventing disruptive incidents, and maintaining […]

Read more →
How to improve operational resilience in a multi-vendor and multi-site world
· Cybersecurity

How to improve operational resilience in a multi-vendor and multi-site world

Introduction to OT/ICS Security Reviewing the OT cybersecurity threat landscape from 2021 to 2022, we have observed that since the outbreak of the COVID-19 crisis, the world’s reliance on networks and information systems has surged to unprecedented levels, with industries and services becoming increasingly interconnected. The COVID-19 crisis has demonstrated the necessity for the digital […]

Read more →
Driving Sustainability, Energy Transition, and Performance through Digitalization
· Connected Industry

Driving Sustainability, Energy Transition, and Performance through Digitalization

Energy transition and sustainability are now being woven into the core business strategies of industrial companies, who now have the mandate and opportunity to tackle environmental and social challenges. Companies that are more advanced in their digital journeys are already integrating sustainability and energy transition initiatives, together with competitive excellence, resilience and agility, and workforce […]

Read more →
Understanding OT-Native Cybersecurity
· Cybersecurity

Understanding OT-Native Cybersecurity

Dave Purdy, OT Cybersecurity Specialist at TXOne, was recently interviewed by ARC’s Vice President, Cybersecurity Services Sid Snitkin at the 2023 ARC Forum, held in Orlando, Florida. We encourage you to view this valuable discussion, as they touched upon the growing importance of understanding OT as a situation unique from IT, especially as IT/OT convergence […]

Read more →
Protecting against new types of threats and attack vectors
· Cybersecurity

Protecting against new types of threats and attack vectors

Following on from the first part of this article entitled, ‘Readying Industrial IoT Networks for Today’s Security Challenges’, which reviews the standardized way to approach security, this article goes through ways to protect against new and emerging threats. Protecting our valuables The complexity of industrial systems rises yearly, with machine learning (ML) algorithms being deployed […]

Read more →
Readying IIoT Networks for Today’s Security Challenges
· Cybersecurity

Readying IIoT Networks for Today’s Security Challenges

Cyber attacks can often seem like the opening scene of a science fiction movie. The mouse pointer starts gliding across a screen with purpose. A technician, looking up to review data on their monitor, sits motionless, frozen through the shock of what they are seeing. Is this a prank? Then, one by one, ransom demands […]

Read more →
Matt Morris on New OT Managed Service for Critical Infrastructure
· Video

Matt Morris on New OT Managed Service for Critical Infrastructure

The OT environment is different from the IT environment in many ways, with proprietary and multi-vendor systems that require a specialized approach. The existing managed security services are generally inadequate as they are focused on IT rather than OT, and the lack of open standards means they are tied to a single vendor. In contrast, […]

Read more →
Insights from Eric Byres, CTO of aDolus, on the Biggest Threats and Emerging Trends
· Video

Insights from Eric Byres, CTO of aDolus, on the Biggest Threats and Emerging Trends

Industrial control systems (ICS) cybersecurity is a growing concern as hackers target critical infrastructures. Eric Byers, CTO of aDolus, shared his thoughts on industrial cybersecurity challenges in this interview with Lucian Fogoros, Co-founder of IioT World. Byers emphasized that nation-state cyberattacks pose the greatest threat to critical infrastructure. While ransomware attacks can be devastating, highly […]

Read more →
Maximizing Cybersecurity Readiness with a Simulation-Based Platform
· Video

Maximizing Cybersecurity Readiness with a Simulation-Based Platform

Cybersecurity is an ever-growing concern, and with the increasing reliance on technology, it’s becoming increasingly important to have professionals who are capable of protecting networks and systems from cyber attacks. However, there is a severe shortage of talented cybersecurity professionals, and those who are in the field are only as good as the experience they’ve […]

Read more →
Separating the wheat from the Chaff in the world of Industrial IoT
· Video

Separating the wheat from the Chaff in the world of Industrial IoT

The shortage of talent in technology and trades has led to an increase in outsourcing cybersecurity activities. When teams outsource security, they rely on external expertise and resources to maintain their security, but also give up control to a third-party. Cybersecurity risk must be evaluated based on potential business impacts, not just vulnerability levels. Automating […]

Read more →
The MetaDefender Kiosk K2100: Military-Grade Portable Media Security Solution
· Cybersecurity

The MetaDefender Kiosk K2100: Military-Grade Portable Media Security Solution

In today’s digital age, critical infrastructure industries rely heavily on operational technology (OT) and industrial control systems (ICS) to run their operations. However, these systems are often isolated through air-gapped networks, making OT personnel dependent on removable media devices to install updates, conduct audits, and transfer data. But, these removable media devices can pose potential […]

Read more →
Addressing the unique cybersecurity challenges facing the Linux community
· Video

Addressing the unique cybersecurity challenges facing the Linux community

In this conversation, the CEO of Foundries.io, George Gray, discusses the challenges of cyber security in Linux devices for IoT. He explains that Linux devices tend to be more complex and have more functionality than other types of IoT devices, which means that there are more attack surfaces for security vulnerabilities. However, the benefit of […]

Read more →