Your one-stop web resource providing safety and security information to manufacturers

Industry Voices

Collaborate to Redesign Role of Manufacturing Network

By Ray Watson As manufacturing technology advances and companies find themselves tasked with managing increasingly sophisticated production systems, the industry is adopting methodologies that will help make operations faster and more efficient than ev …

Rise of Disruptionware

By Ryan Brichant “Disrupting” traditional business models might be hot talk for start-ups pitching investors, but in the world of manufacturing, transportation, energy and similar sectors, real “disruption” of production and facilities due to cyberatta …

Surveillance Security Via Lidar

By Neil Huntingdon Consumers are becoming increasingly concerned as technological advancements offer more convenience at the cost of our privacy. One particularly controversial innovation is facial recognition technology, which utilizes artificial inte …

Cyber Pressure: How to Halt Burnout

By Stefan Liversidge Cyberattacks have been making the headlines daily, and the heat is on for critical infrastructure and other industrial organizations to do something about it. Building cyber resiliency at any speed puts a lot of pressure on an orga …

Standardized Data Can Save Lives

When you email a friend, you don’t have to worry about whether they use Gmail, Outlook, Yahoo or some other email provider. You just enter their email address, write your message and hit send. The reason this works is because there are layers of standardized protocols all email clients have adopted so messages can seamlessly fly between users regardless of which client they choose.

Benefits of Access Control

It’s no surprise that due to the nature of their industry, manufacturing facility leaders have invested a significant amount in the equipment necessary to accomplish streamlined operations and achieve their goals.

ICS Security Maturing: SANS Survey

How does your company’s perception of ICS risk compare to that of other organizations? How are other asset owners defining the boundaries between OT systems and external systems? How do your ICS security roadblocks compare to others? Where does your company rank in terms of managing OT/IT convergence?

Challenge of IoT Security

An attacker’s next point of entry to your corporate network just might be the Internet-connected smart TV in the boardroom, or a connected HVAC device accessed remotely by a third-party service technician. Once inside your network, the attacker can find a way to pivot to the OT network and compromise plant operations and safety. In the plant itself, an unmanaged weak point could be an unpatched Internet-facing VPN router or even a wireless access point.

Human Machine Interface: An Issue of Trust

One of the many unique aspects of the manufacturing industry is its diversity of operating systems in terms of purpose, vintage and version.

Attack Aftermath: Protecting a Reputation

When a cyberattack on an industrial facility succeeds, the highest level of concern is for safety. Making sure that process or manufacturing systems don’t endanger lives, or the environment, is paramount. The next level of concern is business continuit …

Nothing to Step 1: Gaining Visibility

Traditionally, the OT environment is built with a “set it and forget it” mentality. But, once the network is connected to the outside world, that model is no longer optimal. The network becomes dynamic, ever-changing and in constant interaction — most changes are legitimate, some are accidental and some, unfortunately, are nefarious.

Growing Position of a CISO

Slowly but surely, the role of cybersecurity is increasing in importance in industrial and manufacturing organizations of all kinds.

Compliance is Good, Effective Cybersecurity Better

When it comes to compliance, it’s all too easy for businesses to fall into the trap of obeying the letter rather than the spirit of the law. Distilling regulatory requirements down to a checklist of things that must be done is a fine and well-practiced art, but it perhaps misses the point of why the legislation exists in the first place.

Cybersecurity Canadian Style

At the CME (Canadian Manufacturers & Exporters) “Dare to Compete” event in Winnipeg, Canada, likeminded people come together to share their experiences and ideasfor the greater good of manufacturing.

Safety Development Over Time

Although there may be something charming about manually operated tools for both domestic and commercial purposes, not many people could argue with the opinion that modern-day technology has benefited us in many ways.

Protecting the Production Line

Manufacturing is a very competitive market to be in. It has undergone several evolutions in recent years, each with the aim of optimizing production processes and increasing agility to meet customer demands, while also reducing production costs.

How to Address Plant Floor Data Security Threats

In order to fully understand data passing through an industrial network, one needs to take a deep dive and analyze the data itself. In other words, when we have data moving from controllers to I/O blocks, how do we actually know it’s the right data? To …

Reverse Engineering GreyEnergy Malware

It’s important for those defending critical and industrial infrastructure to share knowledge and stay up-to-date on malware tradecraft. With that in mind, when the GreyEnergy Advanced Persistent Threat (APT) ended up unveiled by ESET last year, I put m …

Metrics for an Effective Cybersecurity Program

Previous discussions have looked at how to define and implement cybersecurity programs based on guidance and requirements available from standards, guidelines, frameworks, and other sources. However, implementation is just the beginning since responding to constantly evolving cybersecurity risks is not a project, but a process. As with any management process it must include provisions for continuous improvement, including metrics definition and performance assessment.

SOC Central: Combining IT, OT

With the responsibility to keep their companies ahead of all enterprise-wide threats, CIOs or CISOs certainly feel the increased pressure. Oftentimes these security leaders “grow up” in IT-centered roles, leaving them to feel they’ve got threat detection and response under control. But, what about the operational technology (OT) side of the company?

Pin It on Pinterest