Best Cybersecurity Practices for the IT/OT Environment
· Cybersecurity

Best Cybersecurity Practices for the IT/OT Environment

In the world of IT/OT cybersecurity, there is no silver bullet. What you can do in your organization is to minimize the attack surfaces and threat vectors, and be vigilant and proactive in your defense against adversaries. To that end, we suggest that you implement a multilayered defense-in-depth cybersecurity strategy and stop the cyber threat […]

Read more →
Defending ICS and SCADA Systems from Cyber Attacks
· Cybersecurity

Defending ICS and SCADA Systems from Cyber Attacks

As Operational Technologies (OT) for the Industrial Internet of Things (IIoT) proliferate and converge with enterprise IT systems, CSOs and CIOs need to assess the risks with their growing attack surface. Top of the list should be looking at the potential threats and cyber attacks emanating from the network, given the convergence of OT and […]

Read more →
Managing the Security Issues & Risks of Industrial IoT
· Cybersecurity

Managing the Security Issues & Risks of Industrial IoT

To many people, the Internet of Things (IoT) seems like a new concept. They run around with the idea that IoT is a recent collection of Wi-Fi-enabled Internet-accessible gadgets, from coffee makers, soda machines and refrigerators to Google Glass and FitBits®. Though these are fun toys with some usefulness, most deliver limited utility. These devices are placed on the Internet […]

Read more →
A Historical Perspective on IT & OT Convergence
· Cybersecurity

A Historical Perspective on IT & OT Convergence

Hello IIoT World readers, and thanks for engaging with my column. Over the course of the next few months, I plan to write on a number of topics that are, individually, highly relevant to the IIoT Security realm.  Perhaps more importantly, many of these topics can be viewed as being all inter-related in a way that […]

Read more →
Industrial Espionage is a major threat to the Manufacturing Sector
· Cybersecurity

Industrial Espionage is a major threat to the Manufacturing Sector

Industrial espionage is nothing new. Theft of trade secrets and corporate intellectual property (IP) such as proprietary manufacturing processes, formulas, recipes, and product designs has been happening for decades. And you probably already know this if you work in industries such as manufacturing, pharmaceuticals, and chemicals. What is industrial espionage? Industrial espionage is sometimes credited […]

Read more →
Industrial Robots Gone Rogue: Staying Ahead of Robot Cybersecurity Vulnerabilities
· Artificial Intelligence & ML

Industrial Robots Gone Rogue: Staying Ahead of Robot Cybersecurity Vulnerabilities

If you’re following industrial cyber security trends you know that industrial networks, endpoints and control systems typically have inherent weaknesses that make them insecure and vulnerable to compromise through digital methods. With 5.6 million newly connected devices added per day in 2016 and an estimated 21 billion online by 2020, these current growth trends only […]

Read more →
Industrial Cyber Security: Why IT & OT collaboration is no longer an option but a necessity
· Cybersecurity

Industrial Cyber Security: Why IT & OT collaboration is no longer an option but a necessity

Since the mid-1990s, many industrial companies have interconnected their industrial control systems (ICSs) to improve productivity, maintenance, and safety in the operational environment. Some of this interconnectivity was to  the Internet.  While, this connectivity helped to improved the efficiency, security was at best a minimal consideration. The lack of adequate security planning has resulted in […]

Read more →
Securing Industrial IoT: There is no simple answer
· Cybersecurity

Securing Industrial IoT: There is no simple answer

There are lots of terms thrown around these days, such as: Internet of Things (IoT), Industrial Controls Systems (ICS), Operational Technology (OT). What this means is that there are billions of interconnected consumer devices and industrial systems, not running a traditional computer operating system. This number dwarfs the number of traditional computer systems and it […]

Read more →
Five cybersecurity experts about CrashOverride malware: main dangers and lessons for IIoT
· Cybersecurity

Five cybersecurity experts about CrashOverride malware: main dangers and lessons for IIoT

The National Cybersecurity and Communications Integration Center (NCCIC) is aware of public reports from ESET and Dragos outlining a new, highly capable Industrial Controls Systems (ICS) attack platform that was reportedly used in 2016 against critical infrastructure in Ukraine. As reported by ESET and Dragos, the CrashOverride malware is an extensible platform that could be […]

Read more →
Addressing the Threat of Ransomware
· Cybersecurity

Addressing the Threat of Ransomware

Recently there was a global ransomware cyberattack as never seen before. This single attack affected more than 200 000 computers and wreaked havoc on financial institutions, healthcare organizations and transportation to name just a few. This is the kind of attack that utilities and other critical infrastructure operators must guard against. “To put the problem […]

Read more →