The Critical Role of Security and PKI in IIoT Environments
· Cybersecurity

The Critical Role of Security and PKI in IIoT Environments

The Industrial Internet of Things (IIoT) is all about connecting machines, systems, and sensors to provide operational efficiency and other benefits to industrial applications, similar to the benefits achieved in the world of Internet of Things (IoT) and connected devices The IIoT ecosystem is a collaboration of multiple technologies and partners, which must work in […]

Read more →
A Guide to Securing Critical Infrastructure & OT
· Cybersecurity

A Guide to Securing Critical Infrastructure & OT

2021 saw several attacks on critical infrastructure, which resulted in the U.S. government pivoting to issue directives intended to address cyber protection and readiness. Unlike enterprise IT, OT organizations have little to no flexibility when it comes to downtime – availability is crucial. Attacks against OT systems and critical infrastructure can have dire consequences for the lives […]

Read more →
What Is a SOC? Top Security Operations Center Challenges
· Cybersecurity

What Is a SOC? Top Security Operations Center Challenges

What Is a Security Operations Center (SOC)? A security operations center (SOC) is a critical component of a threat containment plan to protect your business. According to a recent study, having a SOC improves your organization’s ability to contain any threats by 43%. However, first, you must familiarize yourself with the most common challenges SOCs […]

Read more →
3 Benefits of a 360-Degree Vulnerability Assessment
· Connected Industry

3 Benefits of a 360-Degree Vulnerability Assessment

Defending critical infrastructure environments requires 360-degree visibility into asset and network vulnerabilities Vulnerability management teams often face difficulties in patching all of their systems on a timely basis. This is true for traditional OT devices such as HMIs, PLCs, etc. But it is also very true in sensitive IT-like environments such as pharmaceutical labs or […]

Read more →
Everything you need to know about a Man in the Middle Attack
· Cybersecurity

Everything you need to know about a Man in the Middle Attack

A man in the middle attack occurs when a third party intercepts a digital conversation without any knowledge of that interception from the legitimate participants. This conversation can occur between two human users, a human user and a computer system or two computer systems. In any of these cases, the attacker might simply eavesdrop on […]

Read more →
AI vs. AI: The Future of Cybersecurity
· Cybersecurity

AI vs. AI: The Future of Cybersecurity

Artificial Intelligence, or AI, isn’t actually a new concept. In fact, it’s been around since the 1950s. The problem back then was that computers lacked the ability to store commands, so they could be told what to do but couldn’t remember what they did. We’ve certainly come a long way since then! The Good and […]

Read more →
MQTT Enables IIoT Security Best Practices within the Purdue Model
· Connected Industry

MQTT Enables IIoT Security Best Practices within the Purdue Model

As Industrial IoT has evolved over the past decade or two, the vision for secure data communications and the integration of enterprise and control systems has evolved at the same time.  When the Purdue Model of Computer Integrated Manufacturing was published in 1990 as a reference for enterprise architecture and ISA 95 was developed a […]

Read more →
Cybersecurity Tips to Avoid Ransomware Attacks
· ICS Security

Cybersecurity Tips to Avoid Ransomware Attacks

This latest ransomware attack on Colonial Pipeline is another call to action for all organizations to increase their cybersecurity efforts, harden their networks against attacks, and improve visibility to malicious actors in your network. Ransomware attacks have gone through many iterations and we’re now seeing phase 4 of these types of attacks. The majority of […]

Read more →
Industry Feedback from Executive Order on Improving the Nation’s Cybersecurity
· ICS Security

Industry Feedback from Executive Order on Improving the Nation’s Cybersecurity

The recent signing of the Executive Order on Improving the Nation’s Cybersecurity has spurred much discussion among the industry.  IIoT World asked for input from leading cybersecurity experts and organizations regarding the EO, and we’re sharing the discussion with our community. Here are some excerpts from our exchanges on LinkedIn:   “Having the EO emphasize […]

Read more →
[White Paper]Protecting the Embedded and IoT Software Build Environment with Software Composition Analysis
· Connected Industry

[White Paper]Protecting the Embedded and IoT Software Build Environment with Software Composition Analysis

Ensuring the quality, reliability and safety of software requires navigating a complex supply chain made up of engineers, operations managers, contractors, and independent software vendors (ISVs), along with open source software (OSS) providers. Oftentimes, device manufacturers that have outsourced development or integrated third-party software are unable to examine the source code. This makes it difficult […]

Read more →
Are We Doing Enough to Secure the US Power Grid?
· Cybersecurity

Are We Doing Enough to Secure the US Power Grid?

An Executive Order from US President Donald Trump in May this year overhauled the backbone of the nation’s electricity infrastructure, highlighting gaps and vulnerabilities in the operations of power systems and bulk power equipment, to attacks by hackers, terrorists and other state adversaries. So, what can be done to secure the US power grid? The […]

Read more →