CxO Insights with Michael Murray: “The level of cybersecurity awareness is as high as I have ever seen it”
· Cybersecurity

CxO Insights with Michael Murray: “The level of cybersecurity awareness is as high as I have ever seen it”

As connectivity to the outside world grows, security is becoming one of the most important topics in industrial IT and Operational Technology. In this interview, Michael Murray, SVP and GM Cyber Physical at BlackRidge Technology, responds to our questions focused on ICS security. Carolina Rudinschi: How would you rate the level of cybersecurity awareness among industry in general? Why? Michael […]

Read more →
Answering your burning IIoT questions with Cyril Perducat, EVP of IoT & Digital Offers, Schneider Electric
· Connected Industry

Answering your burning IIoT questions with Cyril Perducat, EVP of IoT & Digital Offers, Schneider Electric

As any manufacturing company embarking on a digital transformation journey, you want to be more productive and more energy-efficient — all while managing the unknowns such as unpredictable market conditions, geopolitical/trade impacts, and ever-changing consumer demands. Whether large and small, industrial enterprises are looking to IIoT as a way to handle these variables within the […]

Read more →
Security Threats and Risks in Smart Factories
· Cybersecurity

Security Threats and Risks in Smart Factories

Smart factories are manifestations of how the industrial internet of things (IIoT) is changing traditional manufacturing. Organizations in the manufacturing sector already have a basic understanding of what smart factories are as well as their capabilities and the advantages and challenges of building them. A pivotal change to adapt to technological advances like smart factories requires a huge […]

Read more →
Six Cybersecurity Predictions for Critical Infrastructure and the IIoT in 2019
· Cybersecurity

Six Cybersecurity Predictions for Critical Infrastructure and the IIoT in 2019

Those of us who like to think about the future are always tempted to prognosticate at the beginning of a new year. Following are my top six cybersecurity predictions for 2019, based on the developments and trends that we’re watching closely. Segmentation and segregation will continue to be evangelized and adopted by the government, critical […]

Read more →
Security Architecture for Smart Factories
· Cybersecurity

Security Architecture for Smart Factories

Building smart factories is a substantial endeavor for organizations. The initial steps involve understanding what makes them unique and what new advantages they offer. However, a realistic view of smart factories also involves acknowledging the risks and threats that may arise in its converged virtual and physical environment. As with many systems that integrate with the industrial internet of things […]

Read more →
ICS security: what we should be aware of and what we should expect?
· Cybersecurity

ICS security: what we should be aware of and what we should expect?

For organizations and entities that have a zero downtime modus operandi, insuring that cyber threats are mitigated without taking systems offline is critical. During this interview, IIoT World’s Chief Innovation Officer, Greg Orloff, dives in with Michael Murray, Senior Vice President and General Manager of Cyber Physical Systems at BlackRidge Technology, to pull back the […]

Read more →
One of Deutschland’s Iconic Businesses Addresses the Issue of Trust, Directly
· Cybersecurity

One of Deutschland’s Iconic Businesses Addresses the Issue of Trust, Directly

What does it mean to trust someone or something?  To my way of thinking, trust is having confidence that a person or organization will take actions that ensure my safety while aligning with my beliefs, expectations, and ideals.  In days past, perhaps it was more straight-forward.  A ride on the railroad required faith that the […]

Read more →
Machine-to-Machine (M2M) Technology Design Issues and Implementation Vulnerabilities
· Cybersecurity

Machine-to-Machine (M2M) Technology Design Issues and Implementation Vulnerabilities

In our latest research paper, titled “The Fragility of Industrial IoT’s Data Backbone: Security and Privacy Issues in MQTT and CoAP Protocols” and written with Rainer Vosseler and Davide Quarta, we discussed how MQTT and CoAP are affected by design issues and implementation vulnerabilities that can allow attackers to subvert devices enabled by these two […]

Read more →
Insiders – the biggest security threat to their organizations
· Cybersecurity

Insiders – the biggest security threat to their organizations

It was only a matter of time before what befell the Information Technology (IT) community was going to affect the Operational Technology (OT) community. Today, the OT C-suite is saddled with agenda items keeping them up at night. It is the constant and unrelenting security threat that at any moment can land the organization on […]

Read more →
Three Days of Insight into the Rebirth of Michigan – Cybersecurity
· Cybersecurity

Three Days of Insight into the Rebirth of Michigan – Cybersecurity

Day One As a proud graduate of The Ohio State University, when I think of Michigan, several things come to mind…but tossing aside for a moment the rivalries of one’s sports-related youth, the images that surface for me tend to be namesakes of a winged variety:  The Falcon, The Road Runner, The Firebird.  Yes, the […]

Read more →
A better security for critical infrastructure using strong authentication
· Cybersecurity

A better security for critical infrastructure using strong authentication

November is National Critical Infrastructure Security and Resilience Month so I thought it would be a great opportunity to discuss some of the security challenges concerning critical infrastructure, specifically the weak access controls in sensitive operational technology (OT) environments. Strong authentication is an essential requirement for critical infrastructure When defending critical infrastructure, it’s necessary to […]

Read more →
All Endpoints Are Not Created Equal, But They All Need Protection
· Cybersecurity

All Endpoints Are Not Created Equal, But They All Need Protection

What you are about to read could be straight out of a horror movie. You would hear the eerie voiceover intoning…”In a world where endpoints are under constant attack, how do you protect yourself? Your critical infrastructure? Your data? Your business?” It’s a weighty question and a huge topic that probably does warrant an entire […]

Read more →