Cybersecurity Threats – The New Reality for Utilities
· Cybersecurity

Cybersecurity Threats – The New Reality for Utilities

Cybersecurity experts agree: Cyberattacks are the new reality for utility companies. On Jan. 10th, 2018, a major power outage hits the Consumer Electronics Show (CES), Las Vegas. For nearly two hours, participants were reminded that without electricity, the digital economy would not survive very well. In 2016, 3.85 trillion kilowatthours (kWh) [EIA] was consumed in the […]

Read more →
Why food & beverage companies should crack down on Cyber threats to ICS
· Cybersecurity

Why food & beverage companies should crack down on Cyber threats to ICS

When we buy groceries at the supermarket, most of us check the ingredients and expiration dates of packaged goods. But how can we be sure that the products we bring home are safe to eat and drink? Naturally, food and beverage (F&B) manufacturers have a vested interest in ensuring the quality and safety of their […]

Read more →
The Importance of Security by Design for IoT Devices
· Cybersecurity

The Importance of Security by Design for IoT Devices

We’re on the verge of an explosion of IoT-related products and services and the security for IoT devices is a concern. We all know that the Internet of Things or IoT has started to disrupt consumers, enterprises and governments and is paving the way of an analytical revolution. From connected homes and self-driving cars, from […]

Read more →
What you need to know about Cybersecurity when adopting IIoT solutions
· Cybersecurity

What you need to know about Cybersecurity when adopting IIoT solutions

According to  an article published by Trend Micro: “in 2018, digital extortion will be at the core of most cybercriminals’ business model and will propel them into other schemes that will get their hands on potentially hefty payouts. Vulnerabilities in IoT devices will expand the attack surface as devices get further woven into the fabric […]

Read more →
The ICS Security considerations checklist
· Cybersecurity

The ICS Security considerations checklist

As you evaluate ICS cyber security solutions to protect your critical infrastructure from threats, there are a few criteria your team must consider throughout the process. We’ve compiled a checklist to help you select a solution that will enable both your ICS engineers and security personnel to secure and control your critical networks. The technology […]

Read more →
Is OT Cybersecurity Better Bolted-On or Designed-In?
· Cybersecurity

Is OT Cybersecurity Better Bolted-On or Designed-In?

Power grid outages driven by malware, dam control system attacks, vehicle onboard system hijacking:  recent incidents like these show how critical cybersecurity has become in connected operational technology. But if you think OT is “just IT in an industrial environment,” then think again. The worlds of operational technology and information technology are fundamentally different. A […]

Read more →
IIC: The Endpoint Security Best Practices White Paper
· Cybersecurity

IIC: The Endpoint Security Best Practices White Paper

The Industrial Internet Consortium published today the Endpoint Security Best Practices white paper. The intended audience includes industrial equipment manufacturers, integrators, and industrial equipment owners and operators. All can benefit by obtaining a clear description of what countermeasures and controls are generally recommended for each level of security. Equipment manufacturers and integrators can define which security level […]

Read more →
Four Advantages of Hiring a Specialized Security Partner for your Smart Manufacturing Processes
· Cybersecurity

Four Advantages of Hiring a Specialized Security Partner for your Smart Manufacturing Processes

Cyberattacks against financial companies such as JPMorgan Chase and Citigroup and vendors such as Target, eBay, and Home Depot have received so much media attention these past years. Unknown to many, smart manufacturing companies are also not immune to cyberattacks. According to Deloitte, smart manufacturers are now being targeted not just by random hackers and […]

Read more →
Three Ways SDN Helps to Solve Industrial IoT’s Undiscovered Security Problems
· Uncategorized

Three Ways SDN Helps to Solve Industrial IoT’s Undiscovered Security Problems

Even before the major denial-of-service attack that took down power in the Ukraine in December 2015, industrial systems experts had been growing more restive about the mounting insecurities of these mission critical systems. That attack brought significant awareness to this issue. In the  18 months since then we’ve seen other similar examples of what happens […]

Read more →
Two key capabilities in the advancement of IoT network security and cyber defense
· Cybersecurity

Two key capabilities in the advancement of IoT network security and cyber defense

Nowadays, cyber-attacks are automated but still under human direction and control, and therefore cyber defenses must also be automated to have any chance of protecting cyber and digital assets from both the automated attacks and the human element behind those attacks. Detecting and thwarting attacks and cleaning up the aftermath is a difficult task. Most […]

Read more →
Major Cybersecurity Vulnerabilities in ICS Mobile Applications
· Cybersecurity

Major Cybersecurity Vulnerabilities in ICS Mobile Applications

Two years ago, mobile technologies were widespread, but IoT mania was only beginning. Today, no one is surprised at the appearance of an IIoT. The idea of putting your logging, monitoring, and even supervisory/control functions in the cloud does not sound as crazy as it did several years ago. If you look at mobile application […]

Read more →