Sponsored by

Topics of the Day

Safeguarding OT from Cyber Threats

Manufacturing is a very competitive market to be in. It has undergone several evolutions in recent years, each with the aim of optimizing production processes and increasing agility to meet customer demands, while also reducing production costs.

Read More
Loading
 

Sponsored by

Securing Digital Transformation

An Internet-enabled industrial CCTV system went live online not too long ago and in three short minutes the camera started to get malicious traffic requests. Think about it: One system placed on the massive Internet and it started getting attacks in three minutes.

Mindset Changing on Safety and Profitability

Safety systems continue working silently in the background, chugging along keeping a constant vigil over manufacturing operations to ensure everyone goes home safely at the end of the day.

Safety, Connectivity and IIoT

Increased connectivity across any manufacturing enterprise, from the oil and gas industry all the way to making buttons for a clothing line, has the potential to hike business intelligence, productivity and profitability.

Security: People as a Strength

It wasn’t that long ago when a German steel mill fell victim to a cyber attack that resulted in parts of the plant failing and a blast furnace workers could not shut down through normal methods.

How to Start a Security Program

Tick, tick, tick, tick, tick; there is no way to stop a second hand, which shifts to minutes and then hours and then days. Like waves crashing on the shore, time keeps moving no matter what.


Safety and Profitability

Safety technology and the professionals behind it provide a solid assurance the process and facility remain safe and sound on a daily basis, there is no doubt. While that is a vital element of process automation, there can be so much more.


Making Time for Security

Not too long ago, a young Polish boy found a hole in the network of a European tram system. He was able to get into the system, navigate his way around and then, using a television remote, he was able to switch tracks using the infrared device on the remote.


Breaking News

 

VIEWS

Forget Hyperbole: Stay True to Security Message

By Gregory Hale One of the good things that occurred after last week’s news from the Department of Homeland Security (DHS) involving Russian attackers being able to penetrate the networks of hundreds of U.S. utilities is the...

FOCAL POINTS

INCIDENTS

Google Patches Critical Chrome Hole

Google released Chrome version 81.0.4044.113 for Windows, Mac, and Linux that addresses a vulnerability where an attacker could exploit to take control of an affected system. The update will roll out over the coming days. As...

PRODUCTS AND SERVICES

AI-Based Safety Platform Releases

Everguard.ai, a developer of Artificial Intelligence-based (AI) worker safety solutions, released Sentri360, an end-to-end safety solution that alerts management and workers in real time to potential safety hazards. Worker...

GOVERNMENT

NY Nuke Safe Despite Nearby Gas Pipeline

Indian Point Energy Center nuclear power plant would remain safe should there be a potential accident on a 42-inch natural gas pipeline located near the plant, said an expert team of Nuclear Regulatory Commission (NRC) staff and...

TECHNOLOGY UPDATE

Parsing Out Stronger Security

A parser, the element in a computer system that converts data inputs into an understandable format, is the first line of defense for cybersecurity and it may soon become even more vital. The role of a parser in a computer system...

TRAINING & CERTIFICATION

Education Program on Key Locking System

A 1.0 Health, Safety and Welfare (HSW) continuing education program is ready to go for architect, engineering, government, and consulting firms focused on critical infrastructure products. The American Institute of Architects...

CAREERS

OH University Gains Cyber Op Major

Cedarville University got the thumbs up from the Ohio Department of Higher Education and the Higher Learning Commission to offer a cyber operations major, effective in the fall 2020 semester. The cyber operations major will...

STANDARDS

NERC Wants to Defer 7 Reliability Standards

North American Electric Reliability Corporation (NERC) filed a motion last Monday with Federal Energy Regulatory Commission (FERC) to defer the implementation of several reliability standards that have effective dates or...

RESEARCH

Trust Key to Security, Tech Infrastructure Future

By viewing incident response in a different light, it is possible to show how experts, and nations, can more effectively combat cyberwarfare when they foster a level of trust that transcends politics. “People often think of...

Industry Voices

  • By Gary DiFazio

    By Gary DiFazio Industrial cybersecurity is a unique animal. It brings together safety principles from the OT environment and security principles from the IT environment to protect your plant’s assets, as well as processes, networks and data. Without c …

  • By Alessandro Di Pinto

    By Alessandro Di Pinto While the world is grappling with the COVID-19 pandemic, nation-state and other threat actors are capitalizing on the climate of fear, uncertainty and doubt to find OT and IoT security gaps and orchestrate new cyberattacks. Phish …

  • By Dave Weinstein

    By Dave Weinstein Oftentimes, when we think about mitigating cyber threats to industrial networks, we focus on preventing attackers from exploiting industrial control systems to achieve a certain desired effect, such as a plant shutdown, power outage, …

  • By Larry Dorie

    By Larry Dorie There is no denying that life has changed dramatically for most Americans over the past week or so, and for many of us, the next few weeks will be filled with uncertainty. With the number of cases of coronavirus increasing across the nat …

Industry White Papers

A Year in Vulnerabilities

In 2017, Dragos tracked 163 vulnerability advisories with an industrial control system (ICS) impact. Of these, the majority were vulnerabilities in insecure- by-design products which are typically deep within an ICS network....

Do NOT follow this link or you will be banned from the site!

Pin It on Pinterest

Share This