Trend Micro Cybersecurity Reference Architecture for Operational Technology
· Cybersecurity

Trend Micro Cybersecurity Reference Architecture for Operational Technology

The evolution of the Internet of Things (IoT) has made life a lot more convenient and productive for both consumers and businesses alike over past few years, but on the other side, cybersecurity is an emerging challenge. For automobile original equipment manufacturers (OEMs), Tier 1 suppliers, car dealers, service providers, car owners and drivers, cyberattacks […]

Read more →
How to invest your first dollar in Industrial Cybersecurity?
· Cybersecurity

How to invest your first dollar in Industrial Cybersecurity?

Wanacry and NotPetya achieved what the experts were struggling to do: propel cybersecurity issues on board and raise awareness. Recent cyber-attacks have already cost businesses a lot and encourage top management to invest now their first money in their ICS cybersecurity. Once companies are ready to invest, the following questions arise: what level of security […]

Read more →
15 predictions for ICS cybersecurity in 2018
· Cybersecurity

15 predictions for ICS cybersecurity in 2018

This year was one of the most intense in terms of cybersecurity attacks affecting industrial control systems. For the first time since Stuxnet, a malicious toolset called CrashOverride/Industroyer targeted physical systems. However, the most significant threat to ICS security in 2017 was ransomware attacks. The WannaCry and Petya attacks appear to have changed forever the […]

Read more →
Best Cybersecurity Practices for the IT/OT Environment
· Cybersecurity

Best Cybersecurity Practices for the IT/OT Environment

In the world of IT/OT cybersecurity, there is no silver bullet. What you can do in your organization is to minimize the attack surfaces and threat vectors, and be vigilant and proactive in your defense against adversaries. To that end, we suggest that you implement a multilayered defense-in-depth cybersecurity strategy and stop the cyber threat […]

Read more →
Defending ICS and SCADA Systems from Cyber Attacks
· Cybersecurity

Defending ICS and SCADA Systems from Cyber Attacks

As Operational Technologies (OT) for the Industrial Internet of Things (IIoT) proliferate and converge with enterprise IT systems, CSOs and CIOs need to assess the risks with their growing attack surface. Top of the list should be looking at the potential threats and cyber attacks emanating from the network, given the convergence of OT and […]

Read more →
Managing the Security Issues & Risks of Industrial IoT
· Cybersecurity

Managing the Security Issues & Risks of Industrial IoT

To many people, the Internet of Things (IoT) seems like a new concept. They run around with the idea that IoT is a recent collection of Wi-Fi-enabled Internet-accessible gadgets, from coffee makers, soda machines and refrigerators to Google Glass and FitBits®. Though these are fun toys with some usefulness, most deliver limited utility. These devices are placed on the Internet […]

Read more →
A Historical Perspective on IT & OT Convergence
· Cybersecurity

A Historical Perspective on IT & OT Convergence

Hello IIoT World readers, and thanks for engaging with my column. Over the course of the next few months, I plan to write on a number of topics that are, individually, highly relevant to the IIoT Security realm.  Perhaps more importantly, many of these topics can be viewed as being all inter-related in a way that […]

Read more →
Industrial Espionage is a major threat to the Manufacturing Sector
· Cybersecurity

Industrial Espionage is a major threat to the Manufacturing Sector

Industrial espionage is nothing new. Theft of trade secrets and corporate intellectual property (IP) such as proprietary manufacturing processes, formulas, recipes, and product designs has been happening for decades. And you probably already know this if you work in industries such as manufacturing, pharmaceuticals, and chemicals. What is industrial espionage? Industrial espionage is sometimes credited […]

Read more →
Industrial Robots Gone Rogue: Staying Ahead of Robot Cybersecurity Vulnerabilities
· Artificial Intelligence & ML

Industrial Robots Gone Rogue: Staying Ahead of Robot Cybersecurity Vulnerabilities

If you’re following industrial cyber security trends you know that industrial networks, endpoints and control systems typically have inherent weaknesses that make them insecure and vulnerable to compromise through digital methods. With 5.6 million newly connected devices added per day in 2016 and an estimated 21 billion online by 2020, these current growth trends only […]

Read more →
Industrial Cyber Security: Why IT & OT collaboration is no longer an option but a necessity
· Cybersecurity

Industrial Cyber Security: Why IT & OT collaboration is no longer an option but a necessity

Since the mid-1990s, many industrial companies have interconnected their industrial control systems (ICSs) to improve productivity, maintenance, and safety in the operational environment. Some of this interconnectivity was to  the Internet.  While, this connectivity helped to improved the efficiency, security was at best a minimal consideration. The lack of adequate security planning has resulted in […]

Read more →