Will Catastrophic Loss Drive OT/IT Convergence?
Cyberattacks on strategic infrastructure are increasing in frequency and sophistication, escalating risk and compliance
Read more →
Cyberattacks on strategic infrastructure are increasing in frequency and sophistication, escalating risk and compliance
Read more →
In the food production industry, high-tech tools and systems are being used to optimize production conditions. But new technology brings new challenges and risks. The world population is expected to reach 9.8 billion in 2050, according to a study published in 2017 by the United Nations Department of Economic and Social Affairs. The same study also shows […]
Read more →
Financial instruments have given enterprises good tools and processes by which to manage their risk, but there is absolutely no limit to the amount of threat intelligence that security teams can benefit from having at their disposal. To help enterprise security teams reduce risk even more, we’ve just announced the release of the RunSafe Pwn […]
Read more →
As connectivity to the outside world grows, security is becoming one of the most important topics in industrial IT and Operational Technology. In this interview, Michael Murray, SVP and GM Cyber Physical at BlackRidge Technology, responds to our questions focused on ICS security. Carolina Rudinschi: How would you rate the level of cybersecurity awareness among industry in general? Why? Michael […]
Read more →
As any manufacturing company embarking on a digital transformation journey, you want to be more productive and more energy-efficient — all while managing the unknowns such as unpredictable market conditions, geopolitical/trade impacts, and ever-changing consumer demands. Whether large and small, industrial enterprises are looking to IIoT as a way to handle these variables within the […]
Read more →Smart factories are manifestations of how the industrial internet of things (IIoT) is changing traditional manufacturing. Organizations in the manufacturing sector already have a basic understanding of what smart factories are as well as their capabilities and the advantages and challenges of building them. A pivotal change to adapt to technological advances like smart factories requires a huge […]
Read more →
Those of us who like to think about the future are always tempted to prognosticate at the beginning of a new year. Following are my top six cybersecurity predictions for 2019, based on the developments and trends that we’re watching closely. Segmentation and segregation will continue to be evangelized and adopted by the government, critical […]
Read more →
Building smart factories is a substantial endeavor for organizations. The initial steps involve understanding what makes them unique and what new advantages they offer. However, a realistic view of smart factories also involves acknowledging the risks and threats that may arise in its converged virtual and physical environment. As with many systems that integrate with the industrial internet of things […]
Read more →
For organizations and entities that have a zero downtime modus operandi, insuring that cyber threats are mitigated without taking systems offline is critical. During this interview, IIoT World’s Chief Innovation Officer, Greg Orloff, dives in with Michael Murray, Senior Vice President and General Manager of Cyber Physical Systems at BlackRidge Technology, to pull back the […]
Read more →
What does it mean to trust someone or something? To my way of thinking, trust is having confidence that a person or organization will take actions that ensure my safety while aligning with my beliefs, expectations, and ideals. In days past, perhaps it was more straight-forward. A ride on the railroad required faith that the […]
Read more →
In our latest research paper, titled “The Fragility of Industrial IoT’s Data Backbone: Security and Privacy Issues in MQTT and CoAP Protocols” and written with Rainer Vosseler and Davide Quarta, we discussed how MQTT and CoAP are affected by design issues and implementation vulnerabilities that can allow attackers to subvert devices enabled by these two […]
Read more →
It was only a matter of time before what befell the Information Technology (IT) community was going to affect the Operational Technology (OT) community. Today, the OT C-suite is saddled with agenda items keeping them up at night. It is the constant and unrelenting security threat that at any moment can land the organization on […]
Read more →