Education

Supply Chain Attacks eBook - Fall Edition

eBook: Supply Chain Attacks

This eBook includes stories on the impact of the CMMC and how supply chain attacks are changing the nature of ICS security.

Protecting Critical Infrastructure eBook

eBook: Protecting Critical Infrastructure

Critical infrastructure provides the essential services that keep American society running. A cyberattack on these systems could create a destabilizing effect on the nation’s physical security, economic security, public health and/or safety. Featured articles in this […]

Courtesy: CFE Media and Technology

Experience centers teach cybersecurity best practices

The adoption of Industry 4.0 technologies is increasing efficiency and profitability across industrial control system (ICS) environments, making data available from myriad sources, and employing advanced software tools to analyze information. This gives plant staff […]

A good cybersecurity program is focused on threat detection, incident response and vulnerability management. Courtesy: Chris Vavra, CFE Media and Technology

Smart manufacturing needs smart security, communication

Cybersecurity attacks against manufacturing have increased in the last several years and will continue to do. While a majority have a financial motive rather than corporate espionage, the result is the same: It costs a […]

Protecting Critical Infrastructure eBook

eBook: Protecting Critical Infrastructure

Featured articles in this eBook include stories on how a desert water authority added new tech to shore up its systems, whether government regulations are helping keep critical infrastructure safe and how to protect the power grid through cyber-physical threat response.

Courtesy: Bundy Group

Cybersecurity mergers and acquisitions and capital markets update

While the mergers and acquisitions (M&A) and capital raise markets have a wary eye on numerous potential macroeconomic headwinds — the Ukrainian war, inflation, the great resignation — the cybersecurity market continues to demonstrate its […]

Courtesy: Brett Sayles

Technique offers faster security for non-volatile memory tech

Researchers have developed a technique that leverages hardware and software to improve file system security for next-generation memory technologies called non-volatile memories (NVMs). The new encryption technique also permits faster performance than existing software security […]

Courtesy of: Louisiana State University

Taking a ‘hands-on’ approach to smartphone identity verification

As smartphones have grown more sophisticated over the years, so have their accompanying security measures for identity verification. Simple passwords have been replaced by thumbprints and facial recognition. However, those methods do not solve the […]

2022’s top manufacturing cybersecurity risks

2022’s top manufacturing cybersecurity risks

Cyber incidents have become a major problem for large corporations, small businesses and individuals alike. No one is immune from a potential attack, which means everyone in an organization must play a role in safeguarding […]

Introduction to ICS security fundamentals

Introduction to ICS security fundamentals

It’s critical to understand what industrial control systems (ICS) are, why they are vital and outline the unique challenges of securing ICS. What are industrial control systems? Industrial control systems are used for managing, directing, […]

Three ways to engage your workforce in 2022

Three ways to engage your workforce in 2022

One of the biggest challenges we consistently hear from security awareness professionals is how to effectively engage, train, and secure a remote workforce. Many of us thought remote working would end in 2021, that life […]

Test 2 Alt Text

Hottest topics in industrial cybersecurity from 2021

Industrial cybersecurity remains critically important to subscribers of Control Engineering, Plant Engineering, and other CFE Media and Technology publications. Hot topics in 2021 included analysis of prior cybersecurity attacks, malware, rasomware and physical plant damage […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

How can the board help a company stay ahead of the hackers?

When cybersecurity initiatives originate with the board of directors, people pay attention. So what are some steps a board can take to keep their charges ahead of the hackers? As industrial cybersecurity and critical infrastructure […]

Cybersecurity and IT/OT convergence: How to prepare your team

Cybersecurity and IT/OT convergence: How to prepare your team

Cyberattacks have increased since the COVID-19 pandemic. While information technology (IT)/operational technology (OT) convergence remains a hot topic, the conversation about cybersecurity for industrial control systems (ICS) has fallen on deaf ears in some cases. […]

The hidden value in creating cybersecurity audit programs

The hidden value in creating cybersecurity audit programs

One of my first tasks after leaving the National Security Administration (NSA) for private industry in the early ’90s was to write my new company’s information security policy. I’m not sure my previous job as […]

Image courtesy: Brett Sayles

Protecting U.S. critical infrastructure from malware cyberattacks

Over the past year, there has been a sharp increase in cyberattacks using malware to target the systems of critical infrastructure such as utility companies, government agencies and organizations that provide services and products we […]

Courtesy: Brett Sayles

Statewide cybersecurity coalition receives $2 million NSA grant

A new coalition that will enhance North Carolina’s economy and keep its citizens safe through education, research and outreach work in cybersecurity will benefit from a $2 million grant from the National Centers of Academic […]

As threat increases, college cybersecurity programs are more in demand

Designing ‘smart’ security for smart devices

Modern society is inundated with different types of smart devices designed to make people’s lives easier, from virtual assistants to household appliances and health-monitoring devices — not to mention smartphones. While each device has some […]

The D2U model categorizes user data by capturing behavior in all open programs throughout a user’s day. Courtesy: Nathan Armistead/ORNL, U.S. Dept. of Energy

ORNL cybersecurity put to the test

Oak Ridge National Laboratory (ORNL) researchers have created a technology that more realistically emulates user activities to improve cyber testbeds and ultimately prevent cyberattacks. The Data Driven User Emulation, or D2U, uniquely uses machine learning to […]

This image shows a team of robots collaborating to search for and then retrieve lost objects. The use of blockchain technology could enable secure, tamper-proof communication among the robots as they complete their task, according to new research from MIT. Courtesy: Massachusetts Institute of Technology

Using blockchain technology to protect robots

Imagine a team of autonomous drones equipped with advanced sensing equipment, searching for smoke as they fly high above the Sierra Nevada mountains. Once they spot a wildfire, these leader robots relay directions to a swarm […]

Courtesy: QG Media

CS4CA USA Summit launches virtually on September 16 and 17

The Cyber Security for Critical Assets Summit (CS4CA) will bring together hundreds of information technology (IT) and operational technology (OT) security leaders from across U.S. critical infrastructure for two days of strategy planning, insight building […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Six key takeaways from Black Hat USA 2021

In early August, the industry’s largest hybrid event – Black Hat USA 2021 – took place online and at the Mandalay Bay Convention Center in Las Vegas. The event, which highlighted the latest security trends […]

Online Course: How to engineer a secure industrial control network

Online Course: How to engineer a secure industrial control network

In this session, the presenter will outline the current threat landscape, identify some of the most common vulnerabilities and outline some practical first steps to take to secure industrial control systems, as well as how to take a more holistic view of ICS security

Rakesh Verma, computer science professor at the UH College of Natural Sciences and Mathematics, leads the new CyberCops training program. Courtesty: University of Houston

Training the next generation of cybercops

Not so long ago, a strong password felt mighty enough to keep a user safe and computer data private. But now, there are heightened risks in malware, phishing, spearphishing and denial-of-service attacks. Even scarier, it […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Cybersecurity education and research institute established

Washington State University has been selected as a recipient of a $1.5 million Department of Defense (DOD) grant to establish a new cybersecurity education and research program. The Northwest Virtual Institute for Cybersecurity Education and […]

Image courtesy: Brett Sayles

Making computers more secure

Because corporations and governments rely on computers and the internet to run everything from the electric grid, healthcare, and water systems, computer security is extremely important to all of us. It is increasingly being breached: […]

Courtesy: CFE Media screen capture from 2021 Hannover Messe Digital Edition

Cybersecurity is key for digital transformation

Manufacturing is undergoing some major changes and turning toward a digital transformation. Technology is becoming more intertwined with one another thanks to the Industrial Internet of Things (IIoT) and other concepts are bringing everything together. […]

Addressing cybersecurity challenges through collaboration

Addressing cybersecurity challenges through collaboration

Cybersecurity has become a major topic after recent high-profile attacks such as SolarWinds and the Oldsmar attack in Florida. Our work world continues to change due to COVID-19 and is forcing cybersecurity to the front […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Computer chip wins cybersecurity bounty

They fought the chip and the chip won. MORPHEUS, an “unhackable” computer chip developed by computer science researchers at the University of Michigan, lived up to its name in its first bug bounty competition. It […]

Image courtesy: Brett Sayles

Video: How Does Cybercrime Impact My Business?

Video courtesy: CxEnergy Presenter: Derek Hedrick, Ameritech Data Solutions Why has Cybercrime become so prevalent? Because it’s easy, it’s hard to get caught, and it’s really profitable, generating more than $1.5 trillion in 2018 alone. Meanwhile, […]

Courtesy: Seeq Corporation/Microsoft

Hackathon event to analyze, prevent greenhouse gas emissions

Seeq is co-sponsoring the Microsoft Energy Core Methane Emissions Hackathon virtual event. The objective of the hackathon is to overlay oil & gas asset and geographic information system data to pinpoint leak location, and to […]

eBook: Threats and Vulnerabilities

eBook: Threats and Vulnerabilities

Featured articles in this eBook include stories on cybersecurity for IIoT robots, cybersecurity asset updates and using cybersecurity to improve tomorrow’s manufacturing operations.

Research: Cybersecurity requires asset updates

Research: Cybersecurity requires asset updates

Age of existing assets are the greatest cybersecurity risk factor, 67% in 2020 Control Engineering research, up from 46% in 2016. This is of particular concern with remote operations increasing due to the COVID-19 pandemic and manufacturing starting up again.

Engineering researchers form cybersecurity partnership

Engineering researchers form cybersecurity partnership

Engineering researchers at the National Center for Reliable Electric Power Transmission, based at the University of Arkansas, Fayetteville, are partnering with the Forge Institute and the University of Arkansas at Little Rock to advance applied research […]

Cybersecurity tips from control engineers

Cybersecurity tips from control engineers

Cybersecurity advice about process, technologies, people (internal) and external threat resulted from the Control Engineering 2020 Cybersecurity Research Report. See graphic of technologies and services used online.

Cybersecurity certification may soon be required for manufacturers

Cybersecurity certification may soon be required for manufacturers

Many manufacturers do business with the U.S. Department of Defense (DOD) directly or through original equipment manufacturers (OEMs) and other contractors. The industry is paying attention to the new Cybersecurity Maturity Model Certification (CMMC) because […]

Courtesy: CFE Media and Technology

Engineers use many cybersecurity information sources

There are many associations dedicated to cybersecurity information out there for engineers. Many of them are dedicated to helping engineers regardless of their specialty, particularly in the last few years. It’s a necessity with the […]

University receives award to prepare students for cybersecurity jobs

Preparing students for cybersecurity jobs

West Virginia University has received a $1 million award from the National Science Foundation (NSF) to prepare students for cybersecurity jobs with a project called “ACCESS,” which cultivates cybersecurity experts through scholarships and education.

Researchers working on automating fleet of drones

Researchers working on automating fleet of drones

A team of researchers at Iowa State University are looking to deploy fleets of drones, but it’s trickier than it sounds due to unexpected weather events and cybersecurity concerns.

University receives award to prepare students for cybersecurity jobs

Combining IT, OT with a security operations center

Companies can help prevent cyberattacks by forming a security operations center (SOC) to get the information technology (IT) and operations technology (OT) on the same page with the same goals.

Supply Chain Attacks eBook - Fall Edition

eBook: Supply Chain Attacks

This eBook includes stories on the impact of the CMMC and how supply chain attacks are changing the nature of ICS security.

Protecting Critical Infrastructure eBook

eBook: Protecting Critical Infrastructure

Critical infrastructure provides the essential services that keep American society running. A cyberattack on these systems could create a destabilizing effect on the nation’s physical security, economic security, public health and/or safety. Featured articles in this […]

Courtesy: CFE Media and Technology

Experience centers teach cybersecurity best practices

The adoption of Industry 4.0 technologies is increasing efficiency and profitability across industrial control system (ICS) environments, making data available from myriad sources, and employing advanced software tools to analyze information. This gives plant staff […]

A good cybersecurity program is focused on threat detection, incident response and vulnerability management. Courtesy: Chris Vavra, CFE Media and Technology

Smart manufacturing needs smart security, communication

Cybersecurity attacks against manufacturing have increased in the last several years and will continue to do. While a majority have a financial motive rather than corporate espionage, the result is the same: It costs a […]

Protecting Critical Infrastructure eBook

eBook: Protecting Critical Infrastructure

Featured articles in this eBook include stories on how a desert water authority added new tech to shore up its systems, whether government regulations are helping keep critical infrastructure safe and how to protect the power grid through cyber-physical threat response.

Courtesy: Bundy Group

Cybersecurity mergers and acquisitions and capital markets update

While the mergers and acquisitions (M&A) and capital raise markets have a wary eye on numerous potential macroeconomic headwinds — the Ukrainian war, inflation, the great resignation — the cybersecurity market continues to demonstrate its […]

Courtesy: Brett Sayles

Technique offers faster security for non-volatile memory tech

Researchers have developed a technique that leverages hardware and software to improve file system security for next-generation memory technologies called non-volatile memories (NVMs). The new encryption technique also permits faster performance than existing software security […]

Courtesy of: Louisiana State University

Taking a ‘hands-on’ approach to smartphone identity verification

As smartphones have grown more sophisticated over the years, so have their accompanying security measures for identity verification. Simple passwords have been replaced by thumbprints and facial recognition. However, those methods do not solve the […]

2022’s top manufacturing cybersecurity risks

2022’s top manufacturing cybersecurity risks

Cyber incidents have become a major problem for large corporations, small businesses and individuals alike. No one is immune from a potential attack, which means everyone in an organization must play a role in safeguarding […]

Introduction to ICS security fundamentals

Introduction to ICS security fundamentals

It’s critical to understand what industrial control systems (ICS) are, why they are vital and outline the unique challenges of securing ICS. What are industrial control systems? Industrial control systems are used for managing, directing, […]

Three ways to engage your workforce in 2022

Three ways to engage your workforce in 2022

One of the biggest challenges we consistently hear from security awareness professionals is how to effectively engage, train, and secure a remote workforce. Many of us thought remote working would end in 2021, that life […]

Test 2 Alt Text

Hottest topics in industrial cybersecurity from 2021

Industrial cybersecurity remains critically important to subscribers of Control Engineering, Plant Engineering, and other CFE Media and Technology publications. Hot topics in 2021 included analysis of prior cybersecurity attacks, malware, rasomware and physical plant damage […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

How can the board help a company stay ahead of the hackers?

When cybersecurity initiatives originate with the board of directors, people pay attention. So what are some steps a board can take to keep their charges ahead of the hackers? As industrial cybersecurity and critical infrastructure […]

Cybersecurity and IT/OT convergence: How to prepare your team

Cybersecurity and IT/OT convergence: How to prepare your team

Cyberattacks have increased since the COVID-19 pandemic. While information technology (IT)/operational technology (OT) convergence remains a hot topic, the conversation about cybersecurity for industrial control systems (ICS) has fallen on deaf ears in some cases. […]

The hidden value in creating cybersecurity audit programs

The hidden value in creating cybersecurity audit programs

One of my first tasks after leaving the National Security Administration (NSA) for private industry in the early ’90s was to write my new company’s information security policy. I’m not sure my previous job as […]

Image courtesy: Brett Sayles

Protecting U.S. critical infrastructure from malware cyberattacks

Over the past year, there has been a sharp increase in cyberattacks using malware to target the systems of critical infrastructure such as utility companies, government agencies and organizations that provide services and products we […]

Courtesy: Brett Sayles

Statewide cybersecurity coalition receives $2 million NSA grant

A new coalition that will enhance North Carolina’s economy and keep its citizens safe through education, research and outreach work in cybersecurity will benefit from a $2 million grant from the National Centers of Academic […]

As threat increases, college cybersecurity programs are more in demand

Designing ‘smart’ security for smart devices

Modern society is inundated with different types of smart devices designed to make people’s lives easier, from virtual assistants to household appliances and health-monitoring devices — not to mention smartphones. While each device has some […]

The D2U model categorizes user data by capturing behavior in all open programs throughout a user’s day. Courtesy: Nathan Armistead/ORNL, U.S. Dept. of Energy

ORNL cybersecurity put to the test

Oak Ridge National Laboratory (ORNL) researchers have created a technology that more realistically emulates user activities to improve cyber testbeds and ultimately prevent cyberattacks. The Data Driven User Emulation, or D2U, uniquely uses machine learning to […]

This image shows a team of robots collaborating to search for and then retrieve lost objects. The use of blockchain technology could enable secure, tamper-proof communication among the robots as they complete their task, according to new research from MIT. Courtesy: Massachusetts Institute of Technology

Using blockchain technology to protect robots

Imagine a team of autonomous drones equipped with advanced sensing equipment, searching for smoke as they fly high above the Sierra Nevada mountains. Once they spot a wildfire, these leader robots relay directions to a swarm […]

Courtesy: QG Media

CS4CA USA Summit launches virtually on September 16 and 17

The Cyber Security for Critical Assets Summit (CS4CA) will bring together hundreds of information technology (IT) and operational technology (OT) security leaders from across U.S. critical infrastructure for two days of strategy planning, insight building […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Six key takeaways from Black Hat USA 2021

In early August, the industry’s largest hybrid event – Black Hat USA 2021 – took place online and at the Mandalay Bay Convention Center in Las Vegas. The event, which highlighted the latest security trends […]

Online Course: How to engineer a secure industrial control network

Online Course: How to engineer a secure industrial control network

In this session, the presenter will outline the current threat landscape, identify some of the most common vulnerabilities and outline some practical first steps to take to secure industrial control systems, as well as how to take a more holistic view of ICS security

Rakesh Verma, computer science professor at the UH College of Natural Sciences and Mathematics, leads the new CyberCops training program. Courtesty: University of Houston

Training the next generation of cybercops

Not so long ago, a strong password felt mighty enough to keep a user safe and computer data private. But now, there are heightened risks in malware, phishing, spearphishing and denial-of-service attacks. Even scarier, it […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Cybersecurity education and research institute established

Washington State University has been selected as a recipient of a $1.5 million Department of Defense (DOD) grant to establish a new cybersecurity education and research program. The Northwest Virtual Institute for Cybersecurity Education and […]

Image courtesy: Brett Sayles

Making computers more secure

Because corporations and governments rely on computers and the internet to run everything from the electric grid, healthcare, and water systems, computer security is extremely important to all of us. It is increasingly being breached: […]

Courtesy: CFE Media screen capture from 2021 Hannover Messe Digital Edition

Cybersecurity is key for digital transformation

Manufacturing is undergoing some major changes and turning toward a digital transformation. Technology is becoming more intertwined with one another thanks to the Industrial Internet of Things (IIoT) and other concepts are bringing everything together. […]

Addressing cybersecurity challenges through collaboration

Addressing cybersecurity challenges through collaboration

Cybersecurity has become a major topic after recent high-profile attacks such as SolarWinds and the Oldsmar attack in Florida. Our work world continues to change due to COVID-19 and is forcing cybersecurity to the front […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Computer chip wins cybersecurity bounty

They fought the chip and the chip won. MORPHEUS, an “unhackable” computer chip developed by computer science researchers at the University of Michigan, lived up to its name in its first bug bounty competition. It […]

Image courtesy: Brett Sayles

Video: How Does Cybercrime Impact My Business?

Video courtesy: CxEnergy Presenter: Derek Hedrick, Ameritech Data Solutions Why has Cybercrime become so prevalent? Because it’s easy, it’s hard to get caught, and it’s really profitable, generating more than $1.5 trillion in 2018 alone. Meanwhile, […]

Courtesy: Seeq Corporation/Microsoft

Hackathon event to analyze, prevent greenhouse gas emissions

Seeq is co-sponsoring the Microsoft Energy Core Methane Emissions Hackathon virtual event. The objective of the hackathon is to overlay oil & gas asset and geographic information system data to pinpoint leak location, and to […]

eBook: Threats and Vulnerabilities

eBook: Threats and Vulnerabilities

Featured articles in this eBook include stories on cybersecurity for IIoT robots, cybersecurity asset updates and using cybersecurity to improve tomorrow’s manufacturing operations.

Research: Cybersecurity requires asset updates

Research: Cybersecurity requires asset updates

Age of existing assets are the greatest cybersecurity risk factor, 67% in 2020 Control Engineering research, up from 46% in 2016. This is of particular concern with remote operations increasing due to the COVID-19 pandemic and manufacturing starting up again.

Engineering researchers form cybersecurity partnership

Engineering researchers form cybersecurity partnership

Engineering researchers at the National Center for Reliable Electric Power Transmission, based at the University of Arkansas, Fayetteville, are partnering with the Forge Institute and the University of Arkansas at Little Rock to advance applied research […]

Cybersecurity tips from control engineers

Cybersecurity tips from control engineers

Cybersecurity advice about process, technologies, people (internal) and external threat resulted from the Control Engineering 2020 Cybersecurity Research Report. See graphic of technologies and services used online.

Cybersecurity certification may soon be required for manufacturers

Cybersecurity certification may soon be required for manufacturers

Many manufacturers do business with the U.S. Department of Defense (DOD) directly or through original equipment manufacturers (OEMs) and other contractors. The industry is paying attention to the new Cybersecurity Maturity Model Certification (CMMC) because […]

Courtesy: CFE Media and Technology

Engineers use many cybersecurity information sources

There are many associations dedicated to cybersecurity information out there for engineers. Many of them are dedicated to helping engineers regardless of their specialty, particularly in the last few years. It’s a necessity with the […]

University receives award to prepare students for cybersecurity jobs

Preparing students for cybersecurity jobs

West Virginia University has received a $1 million award from the National Science Foundation (NSF) to prepare students for cybersecurity jobs with a project called “ACCESS,” which cultivates cybersecurity experts through scholarships and education.

Researchers working on automating fleet of drones

Researchers working on automating fleet of drones

A team of researchers at Iowa State University are looking to deploy fleets of drones, but it’s trickier than it sounds due to unexpected weather events and cybersecurity concerns.

University receives award to prepare students for cybersecurity jobs

Combining IT, OT with a security operations center

Companies can help prevent cyberattacks by forming a security operations center (SOC) to get the information technology (IT) and operations technology (OT) on the same page with the same goals.

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES