Search
Close this search box.

Facilities

Proactive management of plant cybersecurity

Proactive management of plant cybersecurity

A combination of information technology (IT) and operations technology (OT) cybersecurity expertise is required to manage the influx of Industrial Internet of Things (IIoT) devices and increased IT/OT integration.

Image courtesy: Brett Sayles

How to approach IoT cybersecurity for smart buildings

The proliferation of the Internet of Things (IoT) is making buildings more complex and dynamic, with hundreds of devices connecting to disparate systems to perform a wide range of functions like energy management, physical security […]

Courtesy: Chris Vavra, CFE Media

Creating a threat-informed defense for a facility

The MITRE ATT&CK for ICS Matrix provides a common nomenclature that allows asset owners, security researchers and consultants, internal defenders and product vendors to better communicate about adversary techniques. Nothing in it is new to […]

Proactive management of plant cybersecurity

Proactive management of plant cybersecurity

A combination of information technology (IT) and operations technology (OT) cybersecurity expertise is required to manage the influx of Industrial Internet of Things (IIoT) devices and increased IT/OT integration.

Image courtesy: Brett Sayles

How to approach IoT cybersecurity for smart buildings

The proliferation of the Internet of Things (IoT) is making buildings more complex and dynamic, with hundreds of devices connecting to disparate systems to perform a wide range of functions like energy management, physical security […]

Courtesy: Chris Vavra, CFE Media

Creating a threat-informed defense for a facility

The MITRE ATT&CK for ICS Matrix provides a common nomenclature that allows asset owners, security researchers and consultants, internal defenders and product vendors to better communicate about adversary techniques. Nothing in it is new to […]

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES