3 Protocol Trends You Should Know About
Since the introduction of Modbus in the late 1970s, network protocols for critical infrastructure and industrial automation have continually evolved. It’s only been in the past few years, though, that we’ve seen things go from slow evolution to seismic shift. As
The Critical Role of Security and PKI in IIoT Environments
The Industrial Internet of Things (IIoT) is all about connecting machines, systems, and sensors to provide operational efficiency and other benefits to industrial applications, similar to the benefits achieved in the world of Internet of Things (IoT) and connected devices
A Guide to Securing Critical Infrastructure & OT
2021 saw several attacks on critical infrastructure, which resulted in the U.S. government pivoting to issue directives intended to address cyber protection and readiness. Unlike enterprise IT, OT organizations have little to no flexibility when it comes to downtime - availability is
What Is a SOC? Top Security Operations Center Challenges
What Is a Security Operations Center (SOC)? A security operations center (SOC) is a critical component of a threat containment plan to protect your business. According to a recent study, having a SOC improves your organization’s ability to contain any threats
3 Benefits of a 360-Degree Vulnerability Assessment
Defending critical infrastructure environments requires 360-degree visibility into asset and network vulnerabilities Vulnerability management teams often face difficulties in patching all of their systems on a timely basis. This is true for traditional OT devices such as HMIs, PLCs, etc. But
Everything you need to know about a Man in the Middle Attack
A man in the middle attack occurs when a third party intercepts a digital conversation without any knowledge of that interception from the legitimate participants. This conversation can occur between two human users, a human user and a computer system
AI vs. AI: The Future of Cybersecurity
Artificial Intelligence, or AI, isn’t actually a new concept. In fact, it’s been around since the 1950s. The problem back then was that computers lacked the ability to store commands, so they could be told what to do but couldn’t
Attacks from 4G/5G Core Networks: Risks of the Industrial IoT in Compromised Campus Networks
5G is projected to have an impact on the future, though its effects are already being felt today. A part of this conversation is the 4G/5G campus network, which is being rolled out in smart factories, remote power stations, harbors,
MQTT Enables IIoT Security Best Practices within the Purdue Model
As Industrial IoT has evolved over the past decade or two, the vision for secure data communications and the integration of enterprise and control systems has evolved at the same time. When the Purdue Model of Computer Integrated Manufacturing was