Industrial Cyber Security: Why IT & OT collaboration is no longer an option but a necessity
· Cybersecurity

Industrial Cyber Security: Why IT & OT collaboration is no longer an option but a necessity

Since the mid-1990s, many industrial companies have interconnected their industrial control systems (ICSs) to improve productivity, maintenance, and safety in the operational environment. Some of this interconnectivity was to  the Internet.  While, this connectivity helped to improved the efficiency, security was at best a minimal consideration. The lack of adequate security planning has resulted in […]

Read more →
Control system cybersecurity is being discussed but still with misunderstandings
· Cybersecurity

Control system cybersecurity is being discussed but still with misunderstandings

I attended a number of sessions at the February 24-27, 2020 RSA 2020 Cybersecurity Conference in San Francisco. One of the sessions really struck me as getting it right. The session I found most compelling was with Roy Gundy from Johnson and Johnson and Dawn Cappelli from Rockwell Automation. Roy identified that his definition of OT […]

Read more →
The validity of cybersecurity policies for control system environments
· Connected Industry

The validity of cybersecurity policies for control system environments

Control system cyber security is different than IT and requires an understanding of issues unique to control systems. It is time to discuss the validity of cybersecurity policies for control system environments. Cybersecurity policy has been based on preventing malicious attacks against IT data networks. IT cybersecurity has been a problem for more than 20 […]

Read more →
Driving Through the Maze of Cyberthreats Within the Automotive Industry
· Cybersecurity

Driving Through the Maze of Cyberthreats Within the Automotive Industry

Any connected device can be compromised. When we think of vulnerable devices, we immediately think of our phones, laptops, IoT devices, and even enterprise databases. We are moving into a world where our transportation system – cars, trucks, traffic lights, and trains – are becoming vulnerable as well. Before we go much further with this […]

Read more →
Trend Micro teams up with Baker Hughes to address industrial cybersecurity challenges
· Cybersecurity

Trend Micro teams up with Baker Hughes to address industrial cybersecurity challenges

Trend Micro, a global leader in cybersecurity solutions, announced that it will collaborate with Baker Hughes’ Nexus Controls operational technology (OT) security experts through a strategic framework agreement, signed in late 2019. Together the companies aim to provide comprehensive, industry leading guidance and support for enterprises running critical OT environments. The Industrial Internet of Things (IIoT) […]

Read more →
Is OT security ready for the next wave of cybercrime?
· Cybersecurity

Is OT security ready for the next wave of cybercrime?

Forrester’s Predictions 2020: The Internet of Things report has an eye-opening forecast on cybercrime for the coming year – an IoT prediction that demands that we collectively consider how to strengthen OT security. We cannot close the door on connectivity’s many benefits. It’s clear that connectivity across people, assets, and systems empowers us to make […]

Read more →
Real Threats Logs From a Smart Factory Honeypot
· Cybersecurity

Real Threats Logs From a Smart Factory Honeypot

Trend Micro just published the results of a six-month honeypot imitating an industrial factory. The highly sophisticated Operational Technology (OT) honeypot attracted fraud and financially motivated exploits. The six-month investigation revealed that unsecured industrial environments are primarily victims of common threats. The honeypot was compromised for cryptocurrency mining, targeted by two separate ransomware attacks, and […]

Read more →
A New Approach to IIoT Security
· Cybersecurity

A New Approach to IIoT Security

As more operational technology (OT) devices and industrial control systems (ICSs) are connected to information technology (IT) systems over the Internet, the attack surface expands to billions of insecure devices, many of which cannot be patched. That in turn creates a massive population of new attack vectors against physical infrastructure – from power and water […]

Read more →
The Recycling of Industrial Cyber-Attacks
· Cybersecurity

The Recycling of Industrial Cyber-Attacks

How the Malware Dumpster Became Post-industrial Landfill For companies involved in critical infrastructure or any facet of manufacturing processes, one of the big action items today is securing OT. For the very first time, the security of the industrial computers (which run discrete and continuous processes such as PLCs, DCSs and HMIs) has eclipsed the […]

Read more →
IIoT is the Firewall Chasm: Airwall is the Solution
· Cybersecurity

IIoT is the Firewall Chasm: Airwall is the Solution

Network Effects are Powerful Since the early days of TCP/IP, connectivity-driven convergence has created waves of multi-billion dollar markets, seemingly out of thin air. All of the successes thus far have had one thing in common: they created unprecedented network effects. The 1990s ushered in the power of network effects. New levels of connectivity and […]

Read more →
[White paper] A new approach to cyber defense automation
· Cybersecurity

[White paper] A new approach to cyber defense automation

Cyber-attacks are a daily occurrence. While the largest attacks make intermittent headlines, the attacks as a whole are unrelenting. Day after day, hour after hour, our computer and network infrastructure, both enterprise and personal, are probed, scanned and attacked in attempts to penetrate and gain a foothold from which subsequent attacks can be staged.  The […]

Read more →
How to Actively Secure Your Industrial Environment In the New Era of Distrust
· Cybersecurity

How to Actively Secure Your Industrial Environment In the New Era of Distrust

Today’s sophisticated Operations Technology (OT) environments have a large attack surface with numerous attack vectors. Without complete coverage, the likelihood of getting attacked is not a matter of ‘if’; it’s a matter of ‘when’. Security for OT has gained significant attention due to a confluence of events. Up until only recently the IT infrastructure played front […]

Read more →