Security is a shared responsibility between the end user and the cloud provider
· Cybersecurity

Security is a shared responsibility between the end user and the cloud provider

As the security of your data is the most important factor when considering the use of cloud services, we will examine how data is protected at the client site, as it traverses public and private networks, and within the cloud provider’s data centers. Security is a shared responsibility between the end user and the cloud provider […]

Read more →
Digital Health’s cybersecurity imperative
· Cybersecurity

Digital Health’s cybersecurity imperative

If you haven’t already heard, the age of digital health is upon us. And for healthcare providers, patients and consumers, it’s about time. What is digital health? Digital health, sometimes referred to as eHealth or Mobile Health, refers to the many elements that are included in the digital healthcare programs, like health technologies, healthcare, living […]

Read more →
How to implement baseline security measures for every ICS organization
· Cybersecurity

How to implement baseline security measures for every ICS organization

The development of Industrial Control Systems (ICS) over the past two decades has changed the face of many industries. Operational Technology (OT) – largely industrial equipment – has become increasingly connected, and the integration of Information Technology (IT) components allows such devices to leverage software that drives data collection and analysis, resulting in enhanced performance […]

Read more →
The importance of the intent-based security in smart manufacturing
· Cybersecurity

The importance of the intent-based security in smart manufacturing

Industrie 4.0, offers great promise for manufacturers to optimize business operations. The key to any successful Industrial IoT project lies in the factory data. Industrial customers need seamless, secure access to this data to make better business decisions in their plants, which can only happen with a reliable plant to enterprise network and unique software […]

Read more →
Why Industrial Network Switches Differ from Business IT Switches
· Connected Industry

Why Industrial Network Switches Differ from Business IT Switches

Dirt. Dust. Vibration. Shocks. Electrical noise. Blistering heat. Freezing cold. The quick answer to the question of why industrial network switches differ from business IT switches is that the industrial Ethernet switch is built to withstand all these challenges. By comparison, the business IT switch, cosseted by air conditioning in data centers or nestling in […]

Read more →
Hacking Level 0,1 devices can be more significant than Stuxnet
· Cybersecurity

Hacking Level 0,1 devices can be more significant than Stuxnet

Last week, the cyber security focus was on the four natural gas pipeline companies that had their electronic data interfaces, not control systems, hacked. However, from a control and safety system perspective, I believe the more important disclosure was the ICS CERT vulnerability disclosure of the Moxa serial-to-Ethernet convertors (gateways). This is because these types […]

Read more →
TPM – a Powerful, Inexpensive Security Building Block
· Cybersecurity

TPM – a Powerful, Inexpensive Security Building Block

There are two worlds of computer security – high-end systems and then everything else.   Both high- and low-end systems typically employ “top-down” defenses to harden their attack surfaces.  These are “software-only” security techniques. High-end and specialized systems have the additional protection of “bottom-up” defenses in the form of Hardware Security Modules (HSMs).  HSMs sequester secrets […]

Read more →
Four Advantages of Hiring a Specialized Security Partner for your Smart Manufacturing Processes
· Cybersecurity

Four Advantages of Hiring a Specialized Security Partner for your Smart Manufacturing Processes

Cyberattacks against financial companies such as JPMorgan Chase and Citigroup and vendors such as Target, eBay, and Home Depot have received so much media attention these past years. Unknown to many, smart manufacturing companies are also not immune to cyberattacks. According to Deloitte, smart manufacturers are now being targeted not just by random hackers and […]

Read more →
[Whitepaper] Integrating Security Into the IoT Strategy in the New Converged Environment
· Cybersecurity

[Whitepaper] Integrating Security Into the IoT Strategy in the New Converged Environment

Consumers want their work, home and mobile devices to communicate together to provide information that was previously not available from isolated systems. This desire is at the root of the Internet of Things (IoT). The rise of IoT started when consumers began to interconnect devices — ranging from personal computers, smartphones, tablets and wearables, to […]

Read more →