[Report] Exposed and Vulnerable Critical Infrastructure: Water and Energy Industries
· Cybersecurity

[Report] Exposed and Vulnerable Critical Infrastructure: Water and Energy Industries

TrendMicro published research at the end of October revealing how exposed human-machine interface (HMI) systems in thousands of critical water and energy organizations around the world could be exploited, causing significant real-world impacts, such as contaminating the water supply. A vast majority of the identified exposed systems are from smaller energy and water organizations that […]

Read more →
Critical Infrastructure and ICS Security Remain a Network Segmentation Problem
· Cybersecurity

Critical Infrastructure and ICS Security Remain a Network Segmentation Problem

Companies in every industry are developing and implementing connected industrial control applications as strategic digital business initiatives. However, the risks of security breaches and the subsequent impacts to consumer privacy and now personal safety are limiting the delivery of secure and resilient services, that are based on these connected applications.  Many company’s networks remain disconnected […]

Read more →
Staying secure in the smart era: Three rules for cybersecurity
· Cybersecurity

Staying secure in the smart era: Three rules for cybersecurity

Almost half of the manufacturers have fallen victim to cybercrime, according to the Cyber Security Manufacturing Report 2018, published by EEF. One of the biggest challenges for manufacturers is choosing from the range of products and services available to protect against these crimes. Here, I’ll explain three cybersecurity rules that manufacturers should abide by when […]

Read more →
Protect Critical Infrastructure With Runsafe Security’s Alkemist
· Cybersecurity

Protect Critical Infrastructure With Runsafe Security’s Alkemist

Hackers are having increasing success penetrating the operating technology and industrial control systems underpinning data centers, utilities, manufacturing plants. As organizations incorporate smart devices, connect to the Internet of Things, and utilize the cloud to optimize performance, new attack vectors – and cyber vulnerabilities – are created. Skilled cybercriminals only need to find a single […]

Read more →
A High Assurance Approach to Securing Network Infrastructure
· Cybersecurity

A High Assurance Approach to Securing Network Infrastructure

The inconvenient truth is that our current cybersecurity tools and methods are not a match for today’s sophisticated attackers who will target any exposed surface looking for vulnerabilities. Attackers need to only succeed once, while defenders must successfully protect their systems every time against all possible threats. Even the most security-conscious organizations aren’t immune to […]

Read more →
Commercial Availability of Self-Service Cyberhardening Technology
· Cybersecurity

Commercial Availability of Self-Service Cyberhardening Technology

RunSafe Security, the pioneer of a patented cyberhardening process for vulnerable embedded systems, devices and industrial control systems (ICS), has announced the commercial availability of Alkemist, a proprietary self-service technology built to reduce vulnerabilities and deny malware the uniformity needed to execute. Previously known as Software Guardian, Alkemist uses remotely deployable software binary runtime application self-protection […]

Read more →
US Intelligence says Cyber Threat Warning Lights are Blinking Red
· Cybersecurity

US Intelligence says Cyber Threat Warning Lights are Blinking Red

Why Industrial Operations are not Immune Recently, US intelligence chief Dan Coats remarked in a talk at the Hudson Institute that ‘the warning lights are blinking red again’ on cyber attacks, as they were before the Sept 11 attacks in 2001. While Coats addressed most of his comments to the country’s digital infrastructure, he mentioned […]

Read more →
How Adaptive Cyber Security Can Enable Digital Health Adoption
· Smart Cities, Buildings & Infrastructure

How Adaptive Cyber Security Can Enable Digital Health Adoption

Digital health focuses on connecting the systems, tools, medical devices, and services together that deliver needed healthcare to each of us and gives critical data insights to each player across the healthcare delivery landscape that weren’t available before.  According to the recent 8th Annual Industry Pulse Report from Change Healthcare, security and privacy concerns are […]

Read more →
The Antidote to Industrial IoT’s Kryptonite
· Cybersecurity

The Antidote to Industrial IoT’s Kryptonite

Today’s industrial infrastructure is stronger and smarter than ever before. As manufacturers seek greater scalability and efficiency, they’ve automated and digitized their machines to achieve unprecedented power. But these “super” machines have a critical weakness – they were not built to shield against today’s advanced cyberattacks. One single attack – industrial IoT ’s kryptonite – […]

Read more →
Cybersecurity Threats – The New Reality for Utilities
· Cybersecurity

Cybersecurity Threats – The New Reality for Utilities

Cybersecurity experts agree: Cyberattacks are the new reality for utility companies. On Jan. 10th, 2018, a major power outage hits the Consumer Electronics Show (CES), Las Vegas. For nearly two hours, participants were reminded that without electricity, the digital economy would not survive very well. In 2016, 3.85 trillion kilowatthours (kWh) [EIA] was consumed in the […]

Read more →
Why food & beverage companies should crack down on Cyber threats to ICS
· Cybersecurity

Why food & beverage companies should crack down on Cyber threats to ICS

When we buy groceries at the supermarket, most of us check the ingredients and expiration dates of packaged goods. But how can we be sure that the products we bring home are safe to eat and drink? Naturally, food and beverage (F&B) manufacturers have a vested interest in ensuring the quality and safety of their […]

Read more →
The Importance of Security by Design for IoT Devices
· Cybersecurity

The Importance of Security by Design for IoT Devices

We’re on the verge of an explosion of IoT-related products and services and the security for IoT devices is a concern. We all know that the Internet of Things or IoT has started to disrupt consumers, enterprises and governments and is paving the way of an analytical revolution. From connected homes and self-driving cars, from […]

Read more →