Navigating the Challenges of Network Segmentation and Microsegmentation Without Disrupting Operations
· Cybersecurity

Navigating the Challenges of Network Segmentation and Microsegmentation Without Disrupting Operations

Network segmentation offers many benefits for businesses. Segmentation improves security by preventing attacks from spreading across a network and infiltrating unprotected devices. In the event of an attack, segmentation ensures that malware cannot spread into other business systems. Network segmentation also reduces congestion that often results in performance drop-off. This is particularly important to resource-intensive […]

Read more →
February 2023 Industrial IoT & ICS Cybersecurity Events
· Connected Industry

February 2023 Industrial IoT & ICS Cybersecurity Events

Welcome to the second month of 2023! February may be the shortest month of the year, but it doesn’t mean we are short on events. This month, we’ve curated the list, with the timeline of major events happening in February 2023 around the globe, in-person or online, and what’s in it for the IIoT & […]

Read more →
Securing the Convergence of the Manufacturing Internet of Things
· Connected Industry

Securing the Convergence of the Manufacturing Internet of Things

Industrial control systems are often insecure by design, and operational technology (OT) environments are particularly vulnerable to cyberattacks. The increased connectivity between industrial and corporate networks, as well as the need for remote access for employees and third-party suppliers, only adds to the risk. In this panel discussion, we will address the essential elements of […]

Read more →
A Flurry of Regulatory Action and the Need for SBOMs
· Connected Industry

A Flurry of Regulatory Action and the Need for SBOMs

Executive Order 14028 on Improving the Nation’s Cybersecurity was issued in May of 2021 and provided a roadmap for a series of regulatory initiatives that government agencies (and anyone doing business with them) should prepare for. Recently we’ve seen the rollout of two important mandates: OMB Memorandum M-22-18 dated Sept. 14, 2022 establishes requirements for […]

Read more →
How to Protect Your OT Network — Without Disrupting Operations
· Cybersecurity

How to Protect Your OT Network — Without Disrupting Operations

A good portion of existing operational technology (OT) networks were originally built during the air gap days, where isolation from other enterprise systems made for sufficient security. As digital transformation initiatives drive IT and OT networks towards convergence, the result is a network where anything can theoretically connect to anything else. That’s a dangerous amount […]

Read more →
BMS Security: 3 Tips for OEMs to Better Protect Their Devices
· Cybersecurity

BMS Security: 3 Tips for OEMs to Better Protect Their Devices

Connected Building Management Systems (BMS) definitely make a difference in terms of increasing operational performance, reducing energy and maintenance costs, and improving building health and safety. None of this could happen if it weren’t for Original Equipment Manufacturers (OEMs) like you who supply building owners and facilities managers with IIoT and Cloud-enabled devices that, together […]

Read more →
Addressing Operational Technology Equipment Flaws with Zero-Trust Controls
· Cybersecurity

Addressing Operational Technology Equipment Flaws with Zero-Trust Controls

A new report on Operational Technology (OT) equipment flaws from automated cybersecurity software company Forescout outlines the alarming state of OT security. The report titled OT:ICEFALL was crafted by researchers at the company’s Vedere lab. It breaks down 56 vulnerabilities affecting 26 devices from 10 vendors in OT. The findings sound an already blaring alarm […]

Read more →
Q&A on Cyber Resiliency for Operational Technology
· Cybersecurity

Q&A on Cyber Resiliency for Operational Technology

As recent cyberattacks have demonstrated increased risk to both IT and operational technology (OT) environments, resilience readiness today has evolved. It is more than a cybersecurity strategy and involves the enforcement of rules and policies that provide the visibility, control, and situational awareness to respond at the speed of business while ensuring that safety and […]

Read more →
November 2022 Industrial IoT & ICS Cybersecurity Events
· Connected Industry

November 2022 Industrial IoT & ICS Cybersecurity Events

“Autumn carries more gold in its pockets than all other seasons.” This month, we are bringing more events for all seasons. Below is the list – and timeline – of IIoT and ICS Cybersecurity events happening in November 2022 around the globe, in-person or online, and what’s in it for the Industrial IoT & ICS […]

Read more →
A priority investment: cyber security
· Cybersecurity

A priority investment: cyber security

The accelerating transition to digital transformation, with much data and information being processed on the cloud, has opened up exciting new business opportunities, but it has also increased the risk that manufacturing companies may suffer in terms of security. Cyber security is, and will increasingly be, a complex issue that requires, and will require, advanced, […]

Read more →
IT vs OT: Information Technology (IT) vs. Operational Technology (OT) Cybersecurity
· Cybersecurity

IT vs OT: Information Technology (IT) vs. Operational Technology (OT) Cybersecurity

What is OT? Understanding Operational Technology (OT) Operational Technology (OT) refers to the technology and systems used to monitor, control, and manage physical processes and devices in various industrial and infrastructure sectors. Operational technology (OT) uses hardware and software to manage industrial equipment and systems. OT controls high-tech specialist systems, like those found in the […]

Read more →
OT Cybersecurity Best Practices
· Cybersecurity

OT Cybersecurity Best Practices

Some of the OT security best practices for implementing a reliable protection system include: Network mapping and connectivity analysis Detection of suspicious activities, exposures, and malware attacks Implementing a zero-trust framework Aligning the right remote access tools Controlling identity and access management (IAM) Network Mapping and Connectivity Analysis Understanding the physical and digital locations of all devices mapped within […]

Read more →