Securing IoT Devices and Traffic between IoT Sensors and Cloud Analytics
· Cybersecurity

Securing IoT Devices and Traffic between IoT Sensors and Cloud Analytics

It is well documented that IoT devices have introduced new security risks. Most IoT devices must interface to cloud based management and analytics engines and therefore support a TCP/IP stack for this communication. Our IoT endpoint software is designed to augment a device’s TCP/IP stack with very little overhead, providing authentication to the cloud services. […]

Read more →
Hydrocarbon Leak Detection Technologies – What to Consider in Oil & Gas Industry
· Connected Industry

Hydrocarbon Leak Detection Technologies – What to Consider in Oil & Gas Industry

In the Oil and Gas industry, the consequences of hydrocarbon leaks can be severe. Gaseous and liquid leaks of these products can result in fires, explosions, and environmental contamination. These calamities could likely cause harm to employees and the public as well as irreversible damage to company infrastructure and the environment. As the production and […]

Read more →
Major Cybersecurity Vulnerabilities in ICS Mobile Applications
· Cybersecurity

Major Cybersecurity Vulnerabilities in ICS Mobile Applications

Two years ago, mobile technologies were widespread, but IoT mania was only beginning. Today, no one is surprised at the appearance of an IIoT. The idea of putting your logging, monitoring, and even supervisory/control functions in the cloud does not sound as crazy as it did several years ago. If you look at mobile application […]

Read more →
Shifting Tides in IIoT Security
· Cybersecurity

Shifting Tides in IIoT Security

I’ve been writing about OT cybersecurity for a while and, although a consistent part of the message is that the overall level of risk is high and rising, some positive developments should be acknowledged.  In particular, the past couple of years has seen increasing awareness of the issues and growing attention from business leaders.  This […]

Read more →
Adhering to the NIST Cybersecurity Framework with the Indegy Platform
· Cybersecurity

Adhering to the NIST Cybersecurity Framework with the Indegy Platform

US national security depends on the reliability and continuous operations of the nation’s critical infrastructure. The increasing complexity and connectivity of critical infrastructure systems exposes them to cybersecurity threats which put their safety and reliability at risk. The National Institute of Standards and Technology (NIST) Framework was created through the collaboration of the government and […]

Read more →
CXO Insights: ICS process data is the calling card for some of the most secured info on the planet
· CEO Insights

CXO Insights: ICS process data is the calling card for some of the most secured info on the planet

Industrial Control Systems (ICS) allow operators to monitor and control industrial processes, including those in manufacturing, power transmission, oil & gas, and other industries. You can find Industrial Control Systems in lots of different places – from a precise formulation of a particular drug, medicine to running the power grid to building or managing the […]

Read more →
Why ICS cybersecurity is so challenging to get right: A Q&A with Barak Perelman
· Cybersecurity

Why ICS cybersecurity is so challenging to get right: A Q&A with Barak Perelman

Changing business models and new regulatory requirements are accelerating the need for IT/OT convergence. IIoT enables unprecedented levels of real-time connectivity, dramatically increasing cybersecurity risks. Industrial control systems on OT networks have different operational requirements that impact the ability to adapt and respond to new threats – and open up new avenues for cyber attacks. […]

Read more →
“To Edge or not the Edge”
· Connected Industry

“To Edge or not the Edge”

The emergence of Edge Computing in the Industrial Internet of Things (IIoT) has become a cost prohibitive, expensive trend. Overall interest in Edge Computing has risen in the IIoT space because of confusion between the exact needs of IIoT vs. Industry 4.0. For simple definitional clarity, Industry 4.0 technology is destined for the industrial factory; […]

Read more →
Key Questions You Should Ask Your Industrial Video Provider
· Connected Industry

Key Questions You Should Ask Your Industrial Video Provider

Frequently, video solutions intended for industrial use are purchased by the organization’s security department. In most organizations, operations and security are different departments.  This often provides budget, control, and integration challenges within the organization. Treating the video system as part of the SCADA system rather than the security system helps to clearly delineate video’s use, […]

Read more →
Defending ICS and SCADA Systems from Cyber Attacks
· Cybersecurity

Defending ICS and SCADA Systems from Cyber Attacks

As Operational Technologies (OT) for the Industrial Internet of Things (IIoT) proliferate and converge with enterprise IT systems, CSOs and CIOs need to assess the risks with their growing attack surface. Top of the list should be looking at the potential threats and cyber attacks emanating from the network, given the convergence of OT and […]

Read more →