White Paper: The State of Industrial Cybersecurity
· Cybersecurity

White Paper: The State of Industrial Cybersecurity

While global manufacturing companies are implementing digital transformation to survive and grow, cybersecurity threats have become a top concern. In industrial cybersecurity, the convergence of IT and OT has been an important issue for long time. There were inconsistencies in technology and environment, and also in people and processes. This survey provides insight into the […]

Read more →
Digital Transformation for End-to-End Visibility in the Energy Industry
· Energy

Digital Transformation for End-to-End Visibility in the Energy Industry

One of the fundamental qualifications for digital transformation is the connectivity of devices and assets such as controllers, machines, products and even the operators along the entire value chain. Industries are building networks of seamlessly connected digital systems, and controlling and monitoring them over distributed control systems. Digital Transformation for Visibility into Operations With digital […]

Read more →
A SolarWinds-style Attack Has Happened Before-Cybersecurity Lessons Learned
· ICS Security

A SolarWinds-style Attack Has Happened Before-Cybersecurity Lessons Learned

A SolarWinds-style cyberattack happened back in in 2013-14 that affected big government agencies and thousands of companies. What should we have learned from the Dragonfly/HAVEX attack? Software Infiltration A cyberattack group called Dragonfly attacked power plants and industrial sites, employing a very similar tactic to SolarWinds. “The technique of injecting into a supply chain is […]

Read more →
Protecting IT and OT Resources Against Advanced Threats in Manufacturing
· Connected Industry

Protecting IT and OT Resources Against Advanced Threats in Manufacturing

Manufacturing organizations manage expensive and sophisticated equipment at their factories—and the systems that run the machinery are increasingly being connected to the internet. The cybersecurity implications of this trend are significant, including possible threats to physical safety, and in some cases, national security. Companies strive to secure their systems while maintaining business imperatives like operational […]

Read more →
Digital Transformation of an Energy Plant
· Energy

Digital Transformation of an Energy Plant

Located in Flintshire, North Wales, Connah’s Quay rests on the south bank of the River Dee. The current gas-fired power station was commissioned in 1996, although electricity generation activities have been operated on the land as far back as 1954, when it was originally home to a coal-fired plant. The changes the site has seen […]

Read more →
Cybersecurity for Embedded Systems
· ICS Security

Cybersecurity for Embedded Systems

All critical infrastructure is under cyber attack, all the time. The attack on the Oldsmar, FL water supply is a good example. And it’s getting worse; vulnerability to cyber attack is increasing as the embedded devices controlling these critical infrastructures become more connected. The DevOps approach to software development offers an antidote—an opportunity to embed run-time […]

Read more →
Digital Transformation Case Studies – Part 2
· Industrial IoT

Digital Transformation Case Studies – Part 2

Note: Part 1 of Digital Transformation Case Studies can be found here. Case Study #3: Tastitalia connects a different kind of industrial machine to the Internet of Things   Tastitalia, an Italian company that creates customized solutions for human-machine interfaces, managed to control production costs and quality levels of their processes in an extremely precise and continuous […]

Read more →
2020 Annual Cybersecurity Report
· ICS Security

2020 Annual Cybersecurity Report

Looking back at a most unprecedented year, Trend Micro’s Annual cybersecurity Report surveys the most notable and crucial security concerns that emerged and persisted in 2020, and provides users and organizations with insights into how they can navigate a drastically changing threat landscape.  One of the areas of concern is supply chains. Cybersecurity Threats on Supply Chains […]

Read more →
Picking a path: build versus buy
· Connected Industry

Picking a path: build versus buy

Every organization in our digital world has to determine whether it is better to buy commercial off-the-shelf (COTS) software or build software that directly meets their needs. For over 20 years, the argument has strongly favored buy. Historically, COTS has had several advantages: faster time-tomarket, lower engineering costs, lower risk and immediate deployment for use. […]

Read more →
More Interoperability in the IIoT
· Connected Industry

More Interoperability in the IIoT

Why the manufacturing industry needs communication standardsThe digital transformation has been underway on factory floors for some time now. As digital technologies emerges as a key factor for remaining competitive, the need for change gains focus. The sheer complexity of many existing systems makes data transparency and networking difficult and highlights why the production industry […]

Read more →
Digital Transformation Case Studies
· Connected Industry

Digital Transformation Case Studies

The manufacturing industry has been adopting next-gen technologies such as AI (artificial intelligence), advanced data analytics, predictive maintenance, automation, robotics, and more for improved productivity and enhanced safety on factory floors. Cutting-edge technologies can hold the key to optimizing uptime and productivity. Below are two digital transgormation case studies on manufacturers who implemented transformative technologies.  […]

Read more →
Security Risks Are Slowing IT-OT Convergence
· Cybersecurity

Security Risks Are Slowing IT-OT Convergence

Fortinet has worked with Forrester Consulting for a third time to check in on security trends affecting those who manage and maintain critical infrastructure—including the industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems that manage everything from factories to refineries to telecommunications infrastructure. Based on a global survey, the report identifies […]

Read more →