Your one-stop web resource providing safety and security information to manufacturers

Topics of the Day

Safeguarding OT from Cyber Threats

Manufacturing is a very competitive market to be in. It has undergone several evolutions in recent years, each with the aim of optimizing production processes and increasing agility to meet customer demands, while also reducing production costs.

Read More

Going Digital

Smarter, Connected Networks Add Complexity, but Plant Floor Can’t be an Island Anymore A smart,...

Read More
Loading
 

Sponsored by

Securing Digital Transformation

An Internet-enabled industrial CCTV system went live online not too long ago and in three short minutes the camera started to get malicious traffic requests. Think about it: One system placed on the massive Internet and it started getting attacks in three minutes.

Mindset Changing on Safety and Profitability

Safety systems continue working silently in the background, chugging along keeping a constant vigil over manufacturing operations to ensure everyone goes home safely at the end of the day.

Safety, Connectivity and IIoT

Increased connectivity across any manufacturing enterprise, from the oil and gas industry all the way to making buttons for a clothing line, has the potential to hike business intelligence, productivity and profitability.

Security: People as a Strength

It wasn’t that long ago when a German steel mill fell victim to a cyber attack that resulted in parts of the plant failing and a blast furnace workers could not shut down through normal methods.

How to Start a Security Program

Tick, tick, tick, tick, tick; there is no way to stop a second hand, which shifts to minutes and then hours and then days. Like waves crashing on the shore, time keeps moving no matter what.

Safety and Profitability

Safety technology and the professionals behind it provide a solid assurance the process and facility remain safe and sound on a daily basis, there is no doubt. While that is a vital element of process automation, there can be so much more.

Making Time for Security

Not too long ago, a young Polish boy found a hole in the network of a European tram system. He was able to get into the system, navigate his way around and then, using a television remote, he was able to switch tracks using the infrared device on the remote.

Breaking News

 

VIEWS

Forget Hyperbole: Stay True to Security Message

By Gregory Hale One of the good things that occurred after last week’s news from the Department of Homeland Security (DHS) involving Russian attackers being able to penetrate the networks of hundreds of U.S. utilities is the...

FOCAL POINTS

INCIDENTS

Palo Alto Fixed Critical RCE Hole

Palo Alto Networks already fixed a remote code execution (RCE) vulnerability in its GlobalProtect portal and GlobalProtect Gateway interface products in prior maintenance releases. This comes on the heels of a report that came...

PRODUCTS AND SERVICES

CyberX Launches Automated Threat Extraction Platform

CyberX enhanced its specialized IoT/ICS threat intelligence capabilities with an automated threat extraction platform that uses machine learning to identify malware and APT campaigns targeting industrial and critical...

GOVERNMENT

TECHNOLOGY UPDATE

Automating Controller for Hybrid Drones

There is a new approach in development to automatically design a mode-free, model-agnostic, AI-driven controller for any hybrid unmanned aerial vehicles (UAV). Hybrid UAVs are drones that combine the advantages of multi-copters...

TRAINING & CERTIFICATION

Controller Certified to IEC 62443-4-2

Companies can defend their connected operations against security threats and have confidence their control systems are designed with security in mind. That is because the Allen-Bradley ControlLogix 5580 controller from Rockwell...

CAREERS

Protection Against Network, Social Attacks

There is no hiding from the growing breadth and depth of hacks, breaches and assorted other technology-enabled attacks. In fact, in a 2018 report, The White House Council of Economic Advisers placed the costs of “malicious cyber...

STANDARDS

TÜV Rheinland Expands Testing Scope

Occupational Safety and Health Administration (OSHA) expanded its scope of recognition for TÜV Rheinland of North America, Inc. as a Nationally Recognized Testing Laboratory (NRTL). Effective June 5, the expanded scope of...

RESEARCH

DNS Firewalls Could Cut 33% of Breaches: Report

Domain Name System (DNS) firewalls, also known as protective DNS, which are freely available and easy to install, could prevent 33 percent of cybersecurity data breaches from occurring, research from the Global Cyber Alliance...

Industry Voices

  • By

    It’s no surprise that due to the nature of their industry, manufacturing facility leaders have invested a significant amount in the equipment necessary to accomplish streamlined operations and achieve their goals.

  • By Heather MacKenzie

    How does your company’s perception of ICS risk compare to that of other organizations? How are other asset owners defining the boundaries between OT systems and external systems? How do your ICS security roadblocks compare to others? Where does your company rank in terms of managing OT/IT convergence?

  • By Phil Neray

    An attacker’s next point of entry to your corporate network just might be the Internet-connected smart TV in the boardroom, or a connected HVAC device accessed remotely by a third-party service technician. Once inside your network, the attacker can find a way to pivot to the OT network and compromise plant operations and safety. In the plant itself, an unmanaged weak point could be an unpatched Internet-facing VPN router or even a wireless access point.

  • By Dave Cronberger

    One of the many unique aspects of the manufacturing industry is its diversity of operating systems in terms of purpose, vintage and version.

Industry White Papers

A Year in Vulnerabilities

In 2017, Dragos tracked 163 vulnerability advisories with an industrial control system (ICS) impact. Of these, the majority were vulnerabilities in insecure- by-design products which are typically deep within an ICS network....

Pin It on Pinterest

Share This