Industry Voices

Leveraging COVID-19 to Find OT, IoT Gaps

By Alessandro Di Pinto While the world is grappling with the COVID-19 pandemic, nation-state and other threat actors are capitalizing on the climate of fear, uncertainty and doubt to find OT and IoT security gaps and orchestrate new cyberattacks. Phish …

Comprehending OT Supply Chain Risk

By Dave Weinstein Oftentimes, when we think about mitigating cyber threats to industrial networks, we focus on preventing attackers from exploiting industrial control systems to achieve a certain desired effect, such as a plant shutdown, power outage, …

Major Technologies Remote Workers Need

By Larry Dorie There is no denying that life has changed dramatically for most Americans over the past week or so, and for many of us, the next few weeks will be filled with uncertainty. With the number of cases of coronavirus increasing across the nat …

Visibility for Physical, Cyber Security

By Chet Namboodri A small 20-person rock crushing operation suffered a cyberattack that shut operations down for the day. One of the company’s conveyor belt control systems was unable to sense if it was on or off, so the belt kept moving. Product conti …

Uniting Cybersecurity and Video Surveillance

By Tony Dozier While digital transformation is significantly impacting the security industry, it goes beyond just implementing new solutions. CIOs and IT professionals are having to re-examine their established security systems to drive continuous inno …

Collaborate to Redesign Role of Manufacturing Network

By Ray Watson As manufacturing technology advances and companies find themselves tasked with managing increasingly sophisticated production systems, the industry is adopting methodologies that will help make operations faster and more efficient than ev …

Rise of Disruptionware

By Ryan Brichant “Disrupting” traditional business models might be hot talk for start-ups pitching investors, but in the world of manufacturing, transportation, energy and similar sectors, real “disruption” of production and facilities due to cyberatta …

Surveillance Security Via Lidar

By Neil Huntingdon Consumers are becoming increasingly concerned as technological advancements offer more convenience at the cost of our privacy. One particularly controversial innovation is facial recognition technology, which utilizes artificial inte …

Cyber Pressure: How to Halt Burnout

By Stefan Liversidge Cyberattacks have been making the headlines daily, and the heat is on for critical infrastructure and other industrial organizations to do something about it. Building cyber resiliency at any speed puts a lot of pressure on an orga …

Standardized Data Can Save Lives

When you email a friend, you don’t have to worry about whether they use Gmail, Outlook, Yahoo or some other email provider. You just enter their email address, write your message and hit send. The reason this works is because there are layers of standardized protocols all email clients have adopted so messages can seamlessly fly between users regardless of which client they choose.

Benefits of Access Control

It’s no surprise that due to the nature of their industry, manufacturing facility leaders have invested a significant amount in the equipment necessary to accomplish streamlined operations and achieve their goals.

ICS Security Maturing: SANS Survey

How does your company’s perception of ICS risk compare to that of other organizations? How are other asset owners defining the boundaries between OT systems and external systems? How do your ICS security roadblocks compare to others? Where does your company rank in terms of managing OT/IT convergence?

Challenge of IoT Security

An attacker’s next point of entry to your corporate network just might be the Internet-connected smart TV in the boardroom, or a connected HVAC device accessed remotely by a third-party service technician. Once inside your network, the attacker can find a way to pivot to the OT network and compromise plant operations and safety. In the plant itself, an unmanaged weak point could be an unpatched Internet-facing VPN router or even a wireless access point.

Human Machine Interface: An Issue of Trust

One of the many unique aspects of the manufacturing industry is its diversity of operating systems in terms of purpose, vintage and version.

Attack Aftermath: Protecting a Reputation

When a cyberattack on an industrial facility succeeds, the highest level of concern is for safety. Making sure that process or manufacturing systems don’t endanger lives, or the environment, is paramount. The next level of concern is business continuit …

Nothing to Step 1: Gaining Visibility

Traditionally, the OT environment is built with a “set it and forget it” mentality. But, once the network is connected to the outside world, that model is no longer optimal. The network becomes dynamic, ever-changing and in constant interaction — most changes are legitimate, some are accidental and some, unfortunately, are nefarious.

Growing Position of a CISO

Slowly but surely, the role of cybersecurity is increasing in importance in industrial and manufacturing organizations of all kinds.

Compliance is Good, Effective Cybersecurity Better

When it comes to compliance, it’s all too easy for businesses to fall into the trap of obeying the letter rather than the spirit of the law. Distilling regulatory requirements down to a checklist of things that must be done is a fine and well-practiced art, but it perhaps misses the point of why the legislation exists in the first place.

Cybersecurity Canadian Style

At the CME (Canadian Manufacturers & Exporters) “Dare to Compete” event in Winnipeg, Canada, likeminded people come together to share their experiences and ideasfor the greater good of manufacturing.

Safety Development Over Time

Although there may be something charming about manually operated tools for both domestic and commercial purposes, not many people could argue with the opinion that modern-day technology has benefited us in many ways.

Do NOT follow this link or you will be banned from the site!

Pin It on Pinterest