Cybersecurity Risks for Open Source Code
· ICS Security

Cybersecurity Risks for Open Source Code

The adoption of open source code has increased exponentially over the past decade, with a large percentage of commercial software now containing it. Developers are constantly sharing common features and code functionality across the internet and globe. The speed and demand placed upon application teams is high – business used to run via application releases a handful […]

Read more →
Cybersecurity Tips to Avoid Ransomware Attacks
· ICS Security

Cybersecurity Tips to Avoid Ransomware Attacks

This latest ransomware attack on Colonial Pipeline is another call to action for all organizations to increase their cybersecurity efforts, harden their networks against attacks, and improve visibility to malicious actors in your network.Ransomware attacks have gone through many iterations and we’re now seeing phase 4 of these types of attacks. The majority of the […]

Read more →
Industry Feedback from Executive Order on Improving the Nation’s Cybersecurity
· ICS Security

Industry Feedback from Executive Order on Improving the Nation’s Cybersecurity

The recent signing of the Executive Order on Improving the Nation’s Cybersecurity has spurred much discussion among the industry.  IIoT World asked for input from leading cybersecurity experts and organizations regarding the EO, and we’re sharing the discussion with our community. Here are some excerpts from our exchanges on LinkedIn:   “Having the EO emphasize […]

Read more →
Cybersecurity to Improve Profitability
· ICS Security

Cybersecurity to Improve Profitability

Cybersecurity has financial benefits, offers product differentiation, and smooths out the patching processes both for product manufacturers and their customers. The importance of cyber defense will go up over time. Cyber defense and security for embedded systems is justified using a total cost of ownership approach, as quantifying economic benefits will help justify faster adoption. […]

Read more →
eBook: Manufacturing Cybersecurity Case Studies
· Cybersecurity

eBook: Manufacturing Cybersecurity Case Studies

For factories and manufacturers, the need for cybersecurity is urgent. This is due to the concerns arising from operation stoppages caused by security incidents, resulting in loss of revenue. Unlike enterprise IT, system administrators face several issues within smart factory security, namely with difficult-to-eliminate vulnerabilities, the spread of malware, and flat network configurations. Furthermore, when […]

Read more →
White Paper: The State of Industrial Cybersecurity
· Cybersecurity

White Paper: The State of Industrial Cybersecurity

While global manufacturing companies are implementing digital transformation to survive and grow, cybersecurity threats have become a top concern. In industrial cybersecurity, the convergence of IT and OT has been an important issue for long time. There were inconsistencies in technology and environment, and also in people and processes. This survey provides insight into the […]

Read more →
Cybersecurity for Embedded Systems
· ICS Security

Cybersecurity for Embedded Systems

All critical infrastructure is under cyber attack, all the time. The attack on the Oldsmar, FL water supply is a good example. And it’s getting worse; vulnerability to cyber attack is increasing as the embedded devices controlling these critical infrastructures become more connected. The DevOps approach to software development offers an antidote—an opportunity to embed run-time […]

Read more →
How Industrial Control Systems can be secure in the cloud
· Cybersecurity

How Industrial Control Systems can be secure in the cloud

Last month, a major water utilities firm in the UK revealed plans to move a significant part of their SCADA system to the cloud. This is one of the most high-profile transitions of OT to managed cloud services to date. Though moving Industrial Control Systems (ICS) to the cloud has been theoretically possible for at least 10 […]

Read more →
Cybersecurity for Shared Cloud Environments
· Cybersecurity

Cybersecurity for Shared Cloud Environments

In its recent Cloud Workload Protection Platform (CWPP) research note, Gartner identified memory exploit protection as an essential component of any organization’s CWP strategy (Gartner, Cloud Workload Protection Platforms, 2020):  “Exploit Prevention/Memory Protection–application control solutions are fallible and must be combined with exploit prevention and memory protection capabilities…”—Gartner CWPP 2020 Cybersecurity Considerations for the Cloud Cloud deployments […]

Read more →
IIoT World Days Track: ICS Security – Risks, Strategies and Solutions
· Augmented Reality

IIoT World Days Track: ICS Security – Risks, Strategies and Solutions

Track Sponsored by aDolus This track, originally presented at IIoT World Days on June 30, 2020, covers 4 presentations from industry leaders in ICS Security: Five Blind Men and the Elephant called ICS Supply Chain Security The Road to Industrial IoT Security Automated ICS Vulnerability Assessment Identifying Compromises Through Device Profiling Using Open Source Tools […]

Read more →
Rogue Automation: Vulnerable and Malicious Code in Industrial Programming
· Cybersecurity

Rogue Automation: Vulnerable and Malicious Code in Industrial Programming

In this White Paper, previously unknown design flaws that malicious actors could exploit to hide malicious functionalities in industrial programming for robots and other automated manufacturing machines are revealed. Since these flaws are difficult to fix, enterprises that deploy vulnerable machines could face serious consequences. An attacker could exploit them to become persistent within a […]

Read more →
IIoT World Days Track – ICS Security: Bringing Order to ICS Cyber Chaos
· Cybersecurity

IIoT World Days Track – ICS Security: Bringing Order to ICS Cyber Chaos

Track Sponsored by and This track, originally presented at IIoT World Days on July 1, 2020, covers 5 presentations from industry leaders in ICS Security: ICS Security Bringing Order to ICS Cyber Chaos Addressing the Business and Cyber Security Challenges on the New Industrial 4.0 Convergence Creating and Performing a Cybersecurity Tabletop Exercise CMMC, the […]

Read more →