Top January 2022 Industrial IoT & ICS Cybersecurity Events
· Connected Industry

Top January 2022 Industrial IoT & ICS Cybersecurity Events

New year, new beginning, new events! There is nothing more exciting than learning something new. And as we start the new chapter of the year, we welcome you with Top January 2022 Industrial IoT & ICS Cybersecurity Events that is happening around the globe, in-person or virtual, and what’s in it for the IIoT & […]

Read more →
Addressing cybersecurity vulnerabilities in the changing LINUX landscape
· Cybersecurity

Addressing cybersecurity vulnerabilities in the changing LINUX landscape

Linux is a prevalent component of nearly every workload: more than 90% of cloud workloads and 70% of web servers run on it. Like all technology solutions, Linux has continued to evolve over time, potentially opening you up to new cyber security threats. Bad actors often have an advantage because they are working against known security measures […]

Read more →
When Industrial Protocol Translation Goes Wrong
· Cybersecurity

When Industrial Protocol Translation Goes Wrong

A recent research paper delves into the vital role of protocol translation in industrial facilities by looking at the protocol gateway. It is a small device that translates the different protocols used by machinery, sensors, actuators, and computers that operate smart factories, dams, power plants, and other industrial facilities. If protocol gateways fail, then the […]

Read more →
Protect Your Organization Against Ransomware Attacks
· Cybersecurity

Protect Your Organization Against Ransomware Attacks

The following best practices can help focus strategies to protect against this growing threat: Know Your Risks and Plan Accordingly: There are several ransomware attack strategies that organizations need to prepare. Web-based attacks that target and compromise vulnerable systems are a significant attack vector, and Secure Web Gateways can help protect end-users. Fortunately, 52% of organizations […]

Read more →
5 steps for successful OT endpoint cybersecurity risk management
· Cybersecurity

5 steps for successful OT endpoint cybersecurity risk management

Operational Technology (OT) has become a heightened target for cybersecurity attacks. The need to address OT (operational technology) cyber risks has never been greater. New threats are emerging every day – both targeted as well as untargeted collateral damage risks. According to IBM, the manufacturing and energy sectors are now the second and third most […]

Read more →
Everything you need to know about a Man in the Middle Attack
· Cybersecurity

Everything you need to know about a Man in the Middle Attack

A man in the middle attack occurs when a third party intercepts a digital conversation without any knowledge of that interception from the legitimate participants. This conversation can occur between two human users, a human user and a computer system or two computer systems. In any of these cases, the attacker might simply eavesdrop on […]

Read more →
3 Steps to Reduce Risk and Respond to Threats in Industrial Environments
· Cybersecurity

3 Steps to Reduce Risk and Respond to Threats in Industrial Environments

Industrial cyber security leaders – including the C-suite, CISOs, security teams, and operational leaders – are increasingly realizing the potential financial, operational and safety impact of cyber events. Attempting to get their hands around securing this challenging part of their networks, many leaders have kicked off efforts by separating their IT and OT networks, gaining […]

Read more →
Keynote speech – IIoT World’s Industrial Cybersecurity Day
· Video

Keynote speech – IIoT World’s Industrial Cybersecurity Day

For this session we’ve invited The Honorable Lucian Niemeyer currently working many of these issues for the federal government in the Office of Management and Budget to address emerging threats, documented attacks, and the impact and relevance to building owners and operators.

Read more →
Five Guiding Principles for Industrial IoT Security
· Connected Industry

Five Guiding Principles for Industrial IoT Security

The rise of the Internet of Things (IoT) is like the advent of the Internet all over again. From the perspec- tive of new business models and process transformation, IoT applications are perhaps even greater than what the Information Superhighway brought us a few decades ago. The universal connectivity of devices and ongoing innovation borne […]

Read more →
Top five largest cyber-attacks in the past year and lessons learnt
· Cybersecurity

Top five largest cyber-attacks in the past year and lessons learnt

Sponsored by RunSafe Security Cyberattacks are becoming far too common, especially after the COVID-19 pandemic, as companies are changing how they’re doing business. Large cyber-attacks on enterprises’ software, in particular, have already affected millions of users. Unfortunately, these will continue to impact more people unless organizations take proper precautions to prevent cybercriminals from exploiting vulnerabilities. […]

Read more →
[E-Book] The State of OT Cyber Security
· Cybersecurity

[E-Book] The State of OT Cyber Security

Many predictions from ten years ago about a rapid rise in cyber-physical attacks did not come true. Certainly, there has been significant financial damage to many firms resulting from powerful intrusions and attacks. However, relative to the IT world, OT has remained relatively unscathed. The real question is what the patterns of historical attacks, emerging […]

Read more →