Ensuring cybersecurity resilience in an ultra-connected world
· Cybersecurity

Ensuring cybersecurity resilience in an ultra-connected world

The development of the Internet of Things (IoT), Artificial Intelligence (AI), the cloud and big data have enabled devices that started out as unbelievable concepts to become a reality. From a consumer standpoint, these ever-increasing trends are often taken for granted as people become accustomed to smart devices becoming more commonplace in all aspects of […]

Read more →
Cybersecurity and Productivity – What is Their Relationship?
· Cybersecurity

Cybersecurity and Productivity – What is Their Relationship?

Welcome to the Industrial Internet of Things (IIoT) data problem series.  The goal of this series is to help leaders understand the data problems that industrial businesses face when deploying IIoT networks. Cybersecurity in productivity was saved for last, as it is perhaps the most prevalent and relevant issue to many organizations. A recent Financial […]

Read more →
How to Avoid the Most Common Micro-segmentation Mistakes
· Cybersecurity

How to Avoid the Most Common Micro-segmentation Mistakes

It’s possible to protect critical infrastructure without compromising security or your budget — find out how. The Need for Micro-segmentation Industry experts and organizations such as NIST, PCI, and the U.S. Department of Defense are all in agreement concerning the benefits of micro-segmentation, and for good reason: With tens of billions of devices connected to […]

Read more →
Working From Home? Here’s What You Need for Cybersecurity
· Cybersecurity

Working From Home? Here’s What You Need for Cybersecurity

There has been an influx of employees signing in remotely to corporate networks and using cloud-based applications. But this shift could also open doors to cybersecurity risks. Where should cybersecurity fit in? The current workplace reality is that, in response to the ongoing coronavirus (COVID-19) outbreak, many companies around the globe have rolled out work-from-home […]

Read more →
Medical Device Safety and Security: Obvious but not easy to achieve
· Cybersecurity

Medical Device Safety and Security: Obvious but not easy to achieve

With accelerating technology innovation, medical devices are becoming more sophisticated and more connected. Consequently, as in most mission-critical systems, safety and security are two increasingly vital requirements in medical device design. In April 2018, the U.S. Food & Drug Administration (FDA) announced plans to increase regulatory powers over medical device safety, including cybersecurity. This paper […]

Read more →
Control system cybersecurity is being discussed but still with misunderstandings
· Cybersecurity

Control system cybersecurity is being discussed but still with misunderstandings

I attended a number of sessions at the February 24-27, 2020 RSA 2020 Cybersecurity Conference in San Francisco. One of the sessions really struck me as getting it right. The session I found most compelling was with Roy Gundy from Johnson and Johnson and Dawn Cappelli from Rockwell Automation. Roy identified that his definition of OT […]

Read more →
Supply Chain Economics and Cybersecurity
· Cybersecurity

Supply Chain Economics and Cybersecurity

Let’s face it, supply chains are complex and distributed. Operations matter, and for some it is truly a miracle how many coordinated parts come together into a seamless operation. In fact, some manufacturers have tens of thousands of suppliers, from raw materials to hardware to firmware to software and everything in between. As companies continually […]

Read more →
Extend the Lifecycle of Embedded Systems with a Hypervisor
· Cybersecurity

Extend the Lifecycle of Embedded Systems with a Hypervisor

Multiple embedded systems are at the heart of medical devices, transportation systems, automobiles, heavy equipment, and industrial robotics. In complex systems like these, a hypervisor provides the supervision to safely and reliably allowing separate functional software areas to share common hardware and resources. When it comes time to develop a new version of a system, […]

Read more →
Identifying Compromises Through Device Profiling
· Cybersecurity

Identifying Compromises Through Device Profiling

The Internet and our local networks have the ability to handle an amazing quantity of connections simultaneously. That strength leads to a problem when we’re trying to detect malicious traffic: how can we tell when one of our systems is sending traffic that it shouldn’t? In this article, I’ll show you how to detect these […]

Read more →
Facility Managers Guide to Building Systems and Cybersecurity
· Cybersecurity

Facility Managers Guide to Building Systems and Cybersecurity

How to Assure Vendors Establish and Use a Cybersecurity Hygiene Don’t look now, but mainstream business leaders are learning that building systems may be the single biggest block of cybersecurity vulnerability in corporate America. Facility Managers, if you are one, can no longer be unaware, nor should they use traditional approaches to protect their turf […]

Read more →
Trend Micro teams up with Baker Hughes to address industrial cybersecurity challenges
· Cybersecurity

Trend Micro teams up with Baker Hughes to address industrial cybersecurity challenges

Trend Micro, a global leader in cybersecurity solutions, announced that it will collaborate with Baker Hughes’ Nexus Controls operational technology (OT) security experts through a strategic framework agreement, signed in late 2019. Together the companies aim to provide comprehensive, industry leading guidance and support for enterprises running critical OT environments. The Industrial Internet of Things (IIoT) […]

Read more →
Real Threats Logs From a Smart Factory Honeypot
· Cybersecurity

Real Threats Logs From a Smart Factory Honeypot

Trend Micro just published the results of a six-month honeypot imitating an industrial factory. The highly sophisticated Operational Technology (OT) honeypot attracted fraud and financially motivated exploits. The six-month investigation revealed that unsecured industrial environments are primarily victims of common threats. The honeypot was compromised for cryptocurrency mining, targeted by two separate ransomware attacks, and […]

Read more →