IIoT is the Firewall Chasm: Airwall is the Solution
· Cybersecurity

IIoT is the Firewall Chasm: Airwall is the Solution

Network Effects are Powerful Since the early days of TCP/IP, connectivity-driven convergence has created waves of multi-billion dollar markets, seemingly out of thin air. All of the successes thus far have had one thing in common: they created unprecedented network effects. The 1990s ushered in the power of network effects. New levels of connectivity and […]

Read more →
[White paper] A new approach to cyber defense automation
· Cybersecurity

[White paper] A new approach to cyber defense automation

Cyber-attacks are a daily occurrence. While the largest attacks make intermittent headlines, the attacks as a whole are unrelenting. Day after day, hour after hour, our computer and network infrastructure, both enterprise and personal, are probed, scanned and attacked in attempts to penetrate and gain a foothold from which subsequent attacks can be staged.  The […]

Read more →
How to Actively Secure Your Industrial Environment In the New Era of Distrust
· Cybersecurity

How to Actively Secure Your Industrial Environment In the New Era of Distrust

Today’s sophisticated Operations Technology (OT) environments have a large attack surface with numerous attack vectors. Without complete coverage, the likelihood of getting attacked is not a matter of ‘if’; it’s a matter of ‘when’. Security for OT has gained significant attention due to a confluence of events. Up until only recently the IT infrastructure played front […]

Read more →
Six criteria to consider when evaluating industrial cybersecurity solutions
· Cybersecurity

Six criteria to consider when evaluating industrial cybersecurity solutions

Converged infrastructure is only as valuable as it is secure. Attacks on critical infrastructure have grown in frequency and sophistication as bad actors, including nation states, seek to disrupt or disable essential services or to gather intelligence into strategic operations and planning.  The damages of a breach have been well documented. Billions of records have […]

Read more →
Mind the Gap – a Road to IT/OT Alignment
· Cybersecurity

Mind the Gap – a Road to IT/OT Alignment

Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. In a very standard environment, thousands of devices exist and are increasingly being connected via the Industrial Internet of Things (IIoT). This creates new challenges in securing industrial environments specifically by making cyber-security threats even more difficult to detect, investigate […]

Read more →
[Cybersecurity] Ensuring Business Continuity with Blockchain Distributed Storage
· Cybersecurity

[Cybersecurity] Ensuring Business Continuity with Blockchain Distributed Storage

One of DARPA’s original design features of the Internet was to ensure connectivity is resilient to partial failures. This was achieved through decentralization and recovery from failures. With more and more data stored online, we need a similarly robust infrastructure. Any ICT department would be interested in preserving their data during and after network compromise. […]

Read more →
Cybersecurity Q&A with ABB
· Cybersecurity

Cybersecurity Q&A with ABB

According to a study by Inmarsat Enterprise that surveyed 125 businesses across the energy industry, 74% of respondents admitted that their processes to combat cybersecurity threats were lacking, while 73% of them reported that more could be done to protect against data mishandling.   However, despite recognizing the enhanced security threats of industrial IoT, just 43% have invested in […]

Read more →
The Guide to Choosing an Industrial Cybersecurity Solution
· Cybersecurity

The Guide to Choosing an Industrial Cybersecurity Solution

As you evaluate ICS cyber security solutions to protect your critical infrastructure from threats, there are a few criteria your team must consider throughout the process. We’ve compiled a checklist to help you select a solution that will enable both your ICS engineers and security personnel to secure and control your critical networks. Download this resource […]

Read more →
[Research] Securing Smart Factories in the Era of Industry 4.0
· Cybersecurity

[Research] Securing Smart Factories in the Era of Industry 4.0

Adopting Industry 4.0 means not only interconnecting IT and OT networks to build smart factories; it also means having shared responsibilities between IT administrators and OT engineers. These include accounting for assets such as equipment, underlying platforms, and protocols or services in use; assessing them for their criticality in the overall operations; and applying the […]

Read more →
Embracing DevSecOps with Automated Software Binary Security
· Cybersecurity

Embracing DevSecOps with Automated Software Binary Security

DevOps came about with the understanding that software development and information technology operations work together to improve deployment frequency, while maintaining service stability. In this process, security was not often part of an original build, but rather “bolted on” afterwards. The new (and better) thinking is DevSecOps, which removes security from its silo and incorporates […]

Read more →
MQTT and CoAP: Security and Privacy Issues in IoT and IIoT Communication Protocols
· Cybersecurity

MQTT and CoAP: Security and Privacy Issues in IoT and IIoT Communication Protocols

Machine-to-machine (M2M) communication protocols, which enable machines to “talk” with one another so that commands are communicated and data is transmitted, are indispensable to applications and systems that make use of the internet of things (IoT) and the industrial internet of things (IIoT).Message Queuing Telemetry Transport (MQTT) is a communication protocol widely used in both IoT and IIoT deployments. […]

Read more →
Two sides of IT vs. OT Security and ICS Security Operations
· Cybersecurity

Two sides of IT vs. OT Security and ICS Security Operations

People, Process, & Technology on Two sides of the Same Coin Who should perform the security of the operations technology (OT) and industrial control system (ICS) in any given company? This is a question I commonly get, which is based on a need to identify the proper structure, governance, staffing, tooling, training, etc., of personnel […]

Read more →