3 Cybersecurity Steps to Reduce Threats to your Electrical System
· Cybersecurity

3 Cybersecurity Steps to Reduce Threats to your Electrical System

When anyone mentions cybersecurity, you may automatically think they are referring to IT systems. That is because protecting IT networks – and their associated personal, financial, and other proprietary data – has been the responsibility of IT professionals for an exceptionally long time. But what about your operational technology (OT) infrastructures? Are they also at […]

Read more →
Why Cyber Change Outpaces Boardroom Engagement
· Cybersecurity

Why Cyber Change Outpaces Boardroom Engagement

Humans are addicted to stories. But sometimes the stories we tell are overly simplistic. In cybersecurity, a recurring narrative is one of C-suite executives perpetually at odds with IT leaders. They’re disinterested in what the security team does, and release funds begrudgingly and often reactively once a serious incident has occurred. This leads to mounting […]

Read more →
A Guide to Securing Critical Infrastructure & OT
· Cybersecurity

A Guide to Securing Critical Infrastructure & OT

2021 saw several attacks on critical infrastructure, which resulted in the U.S. government pivoting to issue directives intended to address cyber protection and readiness. Unlike enterprise IT, OT organizations have little to no flexibility when it comes to downtime – availability is crucial. Attacks against OT systems and critical infrastructure can have dire consequences for the lives […]

Read more →
[Report] ICS cybersecurity for the Electric Utilities Industry
· Connected Industry

[Report] ICS cybersecurity for the Electric Utilities Industry

The risk of security incidents is rapidly increasing in the electric industry, which plays a crucial role in critical infrastructure. This is due to the increasing vulnerability of the system caused by the modernization of the electricity generation, transmission, and distribution systems (i.e. digitalization, network connectivity, and the use of generic software and IT). There […]

Read more →
A Cyber-Readiness Checklist and Guide
· Cybersecurity

A Cyber-Readiness Checklist and Guide

With Russian military operations currently underway in Ukraine, the question of whether cyber warfare will also be employed remains unanswered. While we have seen cases of destructive cyber actions focused on Ukraine, at this point attribution is not possible. As a result of these actions, there is a heightened sense of concern being felt by […]

Read more →
Top Four Methods to Protect Your Open Source Software
· Cybersecurity

Top Four Methods to Protect Your Open Source Software

What the “Old Ways” for Source Code Security Are Lacking Open source software, in its three decades of existence, has experienced rapid growth and adoption within the software development landscape—and for good reason. It differentiates itself from proprietary software in the fact that developers can inspect, copy, modify, and redistribute the software easier than ever […]

Read more →
March 2022 Industrial IoT & ICS Cybersecurity Events
· Connected Industry

March 2022 Industrial IoT & ICS Cybersecurity Events

Spring has sprung! Or, has it? March brings us Spring, but we, at IIoT World, are bringing you monthly not-to-miss world-shifting events! Below is the list – and timeline – of major events focused on Industrial IoT and ICS Cybersecurity, happening in March 2022 around the globe, in-person or online, and what’s in it for […]

Read more →
Cybersecurity Risk Mitigation Strategies
· Cybersecurity

Cybersecurity Risk Mitigation Strategies

With the rise of cloud computing, remote working, and other digital transformation initiatives, cyberattacks have constantly been on the rise. According to PurplseSec research, cybercrime saw a 600% surge during the pandemic, with ransomware being the most common form of attack, leading to a higher need of finding new cybersecurity risk mitigation strategies. Similarly, CSO Online […]

Read more →
Cybersecurity for Industrial Control Systems: Part 1
· Cybersecurity

Cybersecurity for Industrial Control Systems: Part 1

In this two-part series, we look into various cybersecurity threats that affected industrial control systems endpoints. We also discuss several insights and recommendations to mitigate such threats. The ever-changing technological landscape has made it possible for the business process on the IT side of an enterprise to be interconnected with the physical process on the […]

Read more →
OT Threats Are on the Rise. Are You Prepared?
· Cybersecurity

OT Threats Are on the Rise. Are You Prepared?

For years, operational technology (OT) systems have been working to control everything from factories to transportation networks to utilities. But the reality is that most citizens don’t think about these systems until there’s a problem. That’s why the attack against Colonial Pipeline in May 2021 was so startling. The attack on a segment of the enterprise transcended […]

Read more →
How to Protect Deployed Assets from Log4j
· Cybersecurity

How to Protect Deployed Assets from Log4j

What Is the Log4j Exploit Nearly every week the cybersecurity community buzzes around a newly discovered vulnerability or a breach. December’s alert for the CVE-2021-4428  vulnerability in Apache Foundation’s Log4j software is no different. Also known as the Log4Shell vulnerability, it is present within the log4j-core library commonly used for logging in Java applications. These […]

Read more →
Cybersecurity Trends to Prepare for in 2022
· Cybersecurity

Cybersecurity Trends to Prepare for in 2022

Recap of Cybersecurity and Cyber Attacks in 2021 Dare I say that the past year has been…drumroll…unprecedented…in the realm of cybersecurity and cyber attacks?  Here are some statistics to showcase what the industry has endured over the past 12 months: With the trends over the previous year, ransomware costs are expected to reach $265 Billion […]

Read more →