What you need to know about Cybersecurity when adopting IIoT solutions
· Cybersecurity

What you need to know about Cybersecurity when adopting IIoT solutions

According to  an article published by Trend Micro: “in 2018, digital extortion will be at the core of most cybercriminals’ business model and will propel them into other schemes that will get their hands on potentially hefty payouts. Vulnerabilities in IoT devices will expand the attack surface as devices get further woven into the fabric […]

Read more →
The ICS Security considerations checklist
· Cybersecurity

The ICS Security considerations checklist

As you evaluate ICS cyber security solutions to protect your critical infrastructure from threats, there are a few criteria your team must consider throughout the process. We’ve compiled a checklist to help you select a solution that will enable both your ICS engineers and security personnel to secure and control your critical networks. The technology […]

Read more →
Is OT Cybersecurity Better Bolted-On or Designed-In?
· Cybersecurity

Is OT Cybersecurity Better Bolted-On or Designed-In?

Power grid outages driven by malware, dam control system attacks, vehicle onboard system hijacking:  recent incidents like these show how critical cybersecurity has become in connected operational technology. But if you think OT is “just IT in an industrial environment,” then think again. The worlds of operational technology and information technology are fundamentally different. A […]

Read more →
IIC: The Endpoint Security Best Practices White Paper
· Cybersecurity

IIC: The Endpoint Security Best Practices White Paper

The Industrial Internet Consortium published today the Endpoint Security Best Practices white paper. The intended audience includes industrial equipment manufacturers, integrators, and industrial equipment owners and operators. All can benefit by obtaining a clear description of what countermeasures and controls are generally recommended for each level of security. Equipment manufacturers and integrators can define which security level […]

Read more →
Four Advantages of Hiring a Specialized Security Partner for your Smart Manufacturing Processes
· Cybersecurity

Four Advantages of Hiring a Specialized Security Partner for your Smart Manufacturing Processes

Cyberattacks against financial companies such as JPMorgan Chase and Citigroup and vendors such as Target, eBay, and Home Depot have received so much media attention these past years. Unknown to many, smart manufacturing companies are also not immune to cyberattacks. According to Deloitte, smart manufacturers are now being targeted not just by random hackers and […]

Read more →
Three Ways SDN Helps to Solve Industrial IoT’s Undiscovered Security Problems
· Uncategorized

Three Ways SDN Helps to Solve Industrial IoT’s Undiscovered Security Problems

Even before the major denial-of-service attack that took down power in the Ukraine in December 2015, industrial systems experts had been growing more restive about the mounting insecurities of these mission critical systems. That attack brought significant awareness to this issue. In the  18 months since then we’ve seen other similar examples of what happens […]

Read more →
Two key capabilities in the advancement of IoT network security and cyber defense
· Cybersecurity

Two key capabilities in the advancement of IoT network security and cyber defense

Nowadays, cyber-attacks are automated but still under human direction and control, and therefore cyber defenses must also be automated to have any chance of protecting cyber and digital assets from both the automated attacks and the human element behind those attacks. Detecting and thwarting attacks and cleaning up the aftermath is a difficult task. Most […]

Read more →
Major Cybersecurity Vulnerabilities in ICS Mobile Applications
· Cybersecurity

Major Cybersecurity Vulnerabilities in ICS Mobile Applications

Two years ago, mobile technologies were widespread, but IoT mania was only beginning. Today, no one is surprised at the appearance of an IIoT. The idea of putting your logging, monitoring, and even supervisory/control functions in the cloud does not sound as crazy as it did several years ago. If you look at mobile application […]

Read more →
Trend Micro Cybersecurity Reference Architecture for Operational Technology
· Cybersecurity

Trend Micro Cybersecurity Reference Architecture for Operational Technology

The evolution of the Internet of Things (IoT) has made life a lot more convenient and productive for both consumers and businesses alike over past few years, but on the other side, cybersecurity is an emerging challenge. For automobile original equipment manufacturers (OEMs), Tier 1 suppliers, car dealers, service providers, car owners and drivers, cyberattacks […]

Read more →
How to invest your first dollar in Industrial Cybersecurity?
· Cybersecurity

How to invest your first dollar in Industrial Cybersecurity?

Wanacry and NotPetya achieved what the experts were struggling to do: propel cybersecurity issues on board and raise awareness. Recent cyber-attacks have already cost businesses a lot and encourage top management to invest now their first money in their ICS cybersecurity. Once companies are ready to invest, the following questions arise: what level of security […]

Read more →
15 predictions for ICS cybersecurity in 2018
· Cybersecurity

15 predictions for ICS cybersecurity in 2018

This year was one of the most intense in terms of cybersecurity attacks affecting industrial control systems. For the first time since Stuxnet, a malicious toolset called CrashOverride/Industroyer targeted physical systems. However, the most significant threat to ICS security in 2017 was ransomware attacks. The WannaCry and Petya attacks appear to have changed forever the […]

Read more →