Securing IT and OT in Industrial and Manufacturing Environments
· ICS Security

Securing IT and OT in Industrial and Manufacturing Environments

For many years, industrial control systems—often called “Operational Technology” or OT—have been relatively safe from cyber attacks. The control and telemetry systems used in industrial plants and manufacturing environments were typically placed on isolated or “air gapped” communication networks, and the systems themselves were based on highly specialized operating systems which were difficult to attack […]

Read more →
Smart Factory Case Studies
· Cybersecurity

Smart Factory Case Studies

This summary contains three Smart Factory success stories in IoT manufacturing, from the Semiconductor, Manufacturing and Electrical Engineering industries.  They describe how Trend Micro expertise and solutions addressed a variety of business challenges, including security solutions for cloud infrastructures, connected threat defense and the need for vendor support, visibility across the IT environment and keeping […]

Read more →
Ensuring cybersecurity resilience in an ultra-connected world
· Cybersecurity

Ensuring cybersecurity resilience in an ultra-connected world

The development of the Internet of Things (IoT), Artificial Intelligence (AI), the cloud and big data have enabled devices that started out as unbelievable concepts to become a reality. From a consumer standpoint, these ever-increasing trends are often taken for granted as people become accustomed to smart devices becoming more commonplace in all aspects of […]

Read more →
Industrial Cyber Security: Why IT & OT collaboration is no longer an option but a necessity
· Cybersecurity

Industrial Cyber Security: Why IT & OT collaboration is no longer an option but a necessity

Since the mid-1990s, many industrial companies have interconnected their industrial control systems (ICSs) to improve productivity, maintenance, and safety in the operational environment. Some of this interconnectivity was to  the Internet.  While, this connectivity helped to improved the efficiency, security was at best a minimal consideration. The lack of adequate security planning has resulted in […]

Read more →
Control system cybersecurity is being discussed but still with misunderstandings
· Cybersecurity

Control system cybersecurity is being discussed but still with misunderstandings

I attended a number of sessions at the February 24-27, 2020 RSA 2020 Cybersecurity Conference in San Francisco. One of the sessions really struck me as getting it right. The session I found most compelling was with Roy Gundy from Johnson and Johnson and Dawn Cappelli from Rockwell Automation. Roy identified that his definition of OT […]

Read more →
The validity of cybersecurity policies for control system environments
· Connected Industry

The validity of cybersecurity policies for control system environments

Control system cyber security is different than IT and requires an understanding of issues unique to control systems. It is time to discuss the validity of cybersecurity policies for control system environments. Cybersecurity policy has been based on preventing malicious attacks against IT data networks. IT cybersecurity has been a problem for more than 20 […]

Read more →
Driving Through the Maze of Cyberthreats Within the Automotive Industry
· Cybersecurity

Driving Through the Maze of Cyberthreats Within the Automotive Industry

Any connected device can be compromised. When we think of vulnerable devices, we immediately think of our phones, laptops, IoT devices, and even enterprise databases. We are moving into a world where our transportation system – cars, trucks, traffic lights, and trains – are becoming vulnerable as well. Before we go much further with this […]

Read more →
Trend Micro teams up with Baker Hughes to address industrial cybersecurity challenges
· Cybersecurity

Trend Micro teams up with Baker Hughes to address industrial cybersecurity challenges

Trend Micro, a global leader in cybersecurity solutions, announced that it will collaborate with Baker Hughes’ Nexus Controls operational technology (OT) security experts through a strategic framework agreement, signed in late 2019. Together the companies aim to provide comprehensive, industry leading guidance and support for enterprises running critical OT environments. The Industrial Internet of Things (IIoT) […]

Read more →
Is OT security ready for the next wave of cybercrime?
· Cybersecurity

Is OT security ready for the next wave of cybercrime?

Forrester’s Predictions 2020: The Internet of Things report has an eye-opening forecast on cybercrime for the coming year – an IoT prediction that demands that we collectively consider how to strengthen OT security. We cannot close the door on connectivity’s many benefits. It’s clear that connectivity across people, assets, and systems empowers us to make […]

Read more →
Real Threats Logs From a Smart Factory Honeypot
· Cybersecurity

Real Threats Logs From a Smart Factory Honeypot

Trend Micro just published the results of a six-month honeypot imitating an industrial factory. The highly sophisticated Operational Technology (OT) honeypot attracted fraud and financially motivated exploits. The six-month investigation revealed that unsecured industrial environments are primarily victims of common threats. The honeypot was compromised for cryptocurrency mining, targeted by two separate ransomware attacks, and […]

Read more →
A New Approach to IIoT Security
· Cybersecurity

A New Approach to IIoT Security

As more operational technology (OT) devices and industrial control systems (ICSs) are connected to information technology (IT) systems over the Internet, the attack surface expands to billions of insecure devices, many of which cannot be patched. That in turn creates a massive population of new attack vectors against physical infrastructure – from power and water […]

Read more →
The Recycling of Industrial Cyber-Attacks
· Cybersecurity

The Recycling of Industrial Cyber-Attacks

How the Malware Dumpster Became Post-industrial Landfill For companies involved in critical infrastructure or any facet of manufacturing processes, one of the big action items today is securing OT. For the very first time, the security of the industrial computers (which run discrete and continuous processes such as PLCs, DCSs and HMIs) has eclipsed the […]

Read more →