Six criteria to consider when evaluating industrial cybersecurity solutions
· Cybersecurity

Six criteria to consider when evaluating industrial cybersecurity solutions

Converged infrastructure is only as valuable as it is secure. Attacks on critical infrastructure have grown in frequency and sophistication as bad actors, including nation states, seek to disrupt or disable essential services or to gather intelligence into strategic operations and planning.  The damages of a breach have been well documented. Billions of records have […]

Read more →
Mind the Gap – a Road to IT/OT Alignment
· Cybersecurity

Mind the Gap – a Road to IT/OT Alignment

Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. In a very standard environment, thousands of devices exist and are increasingly being connected via the Industrial Internet of Things (IIoT). This creates new challenges in securing industrial environments specifically by making cyber-security threats even more difficult to detect, investigate […]

Read more →
[Cybersecurity] Ensuring Business Continuity with Blockchain Distributed Storage
· Cybersecurity

[Cybersecurity] Ensuring Business Continuity with Blockchain Distributed Storage

One of DARPA’s original design features of the Internet was to ensure connectivity is resilient to partial failures. This was achieved through decentralization and recovery from failures. With more and more data stored online, we need a similarly robust infrastructure. Any ICT department would be interested in preserving their data during and after network compromise. […]

Read more →
Cybersecurity Q&A with ABB
· Cybersecurity

Cybersecurity Q&A with ABB

According to a study by Inmarsat Enterprise that surveyed 125 businesses across the energy industry, 74% of respondents admitted that their processes to combat cybersecurity threats were lacking, while 73% of them reported that more could be done to protect against data mishandling.   However, despite recognizing the enhanced security threats of industrial IoT, just 43% have invested in […]

Read more →
The Guide to Choosing an Industrial Cybersecurity Solution
· Cybersecurity

The Guide to Choosing an Industrial Cybersecurity Solution

As you evaluate ICS cyber security solutions to protect your critical infrastructure from threats, there are a few criteria your team must consider throughout the process. We’ve compiled a checklist to help you select a solution that will enable both your ICS engineers and security personnel to secure and control your critical networks. Download this resource […]

Read more →
[Research] Securing Smart Factories in the Era of Industry 4.0
· Cybersecurity

[Research] Securing Smart Factories in the Era of Industry 4.0

Adopting Industry 4.0 means not only interconnecting IT and OT networks to build smart factories; it also means having shared responsibilities between IT administrators and OT engineers. These include accounting for assets such as equipment, underlying platforms, and protocols or services in use; assessing them for their criticality in the overall operations; and applying the […]

Read more →
Embracing DevSecOps with Automated Software Binary Security
· Cybersecurity

Embracing DevSecOps with Automated Software Binary Security

DevOps came about with the understanding that software development and information technology operations work together to improve deployment frequency, while maintaining service stability. In this process, security was not often part of an original build, but rather “bolted on” afterwards. The new (and better) thinking is DevSecOps, which removes security from its silo and incorporates […]

Read more →
MQTT and CoAP: Security and Privacy Issues in IoT and IIoT Communication Protocols
· Cybersecurity

MQTT and CoAP: Security and Privacy Issues in IoT and IIoT Communication Protocols

Machine-to-machine (M2M) communication protocols, which enable machines to “talk” with one another so that commands are communicated and data is transmitted, are indispensable to applications and systems that make use of the internet of things (IoT) and the industrial internet of things (IIoT).Message Queuing Telemetry Transport (MQTT) is a communication protocol widely used in both IoT and IIoT deployments. […]

Read more →
Two sides of IT vs. OT Security and ICS Security Operations
· Cybersecurity

Two sides of IT vs. OT Security and ICS Security Operations

People, Process, & Technology on Two sides of the Same Coin Who should perform the security of the operations technology (OT) and industrial control system (ICS) in any given company? This is a question I commonly get, which is based on a need to identify the proper structure, governance, staffing, tooling, training, etc., of personnel […]

Read more →
Cultivating Security in the Food Production Industry
· Cybersecurity

Cultivating Security in the Food Production Industry

In the food production industry, high-tech tools and systems are being used to optimize production conditions. But new technology brings new challenges and risks. The world population is expected to reach 9.8 billion in 2050, according to a study published in 2017 by the United Nations Department of Economic and Social Affairs. The same study also shows […]

Read more →
The Lottery You Don’t Want to Win: Introducing the RunSafe Pwn Index™
· Cybersecurity

The Lottery You Don’t Want to Win: Introducing the RunSafe Pwn Index™

Financial instruments have given enterprises good tools and processes by which to manage their risk, but there is absolutely no limit to the amount of threat intelligence that security teams can benefit from having at their disposal. To help enterprise security teams reduce risk even more, we’ve just announced the release of the RunSafe Pwn […]

Read more →