Search
Close this search box.

IIoT & Cloud

Courtesy: Virginia Tech

Simulating self-driving security

Road testing to improve self-driving security is expensive and time-consuming, but CCI researchers developed a virtual option.

Courtesy: Brett Sayles

Securing IIoT in the manufacturing industry

The Internet of Things (IoT) was evolving as a concept even before it was defined, with household objects quietly sprouting the ability to connect to the internet. Many of these devices have enriched lives to […]

Courtesy of CFE Media and Technology

Cybersecurity in the cloud: how to fortify your company

Power companies, chemical plants, hospitals and critical infrastructure rely on cloud-based services to monitor and control vital processes. This means cloud-managed facilities and industrial control systems (ICS) face omnipresent threats. Rapidly advancing technology, changing work […]

Courtesy: CFE Media

Why network discovery is critical in the ICS/IACS environment

Securing operational technology (OT) networks requires a great deal of thought when designing and implementing security. Industrial networks contain a complex mix of specialized protocols and devices, including proprietary protocols developed for specific families of […]

Courtesy: CFE Media

Stacking the deck for computer security

A new and more reliable method to defend vulnerable data on the stack, a major memory region responsible for storing computer program data for processes, has been developed by an international Penn State-led team. Such […]

Wires plugged into a network

How to secure Industry 4.0 in a highly connected world

As we head into the Industry 4.0 era — where connected Internet of Things (IoT) devices and automation will reshape industries — our world is already highly connected. According to Statista, there are more than […]

New approach allows for faster ransomware detection

New approach allows for faster ransomware detection

Engineering researchers have developed a new approach for implementing ransomware detection techniques, allowing them to detect a broad range of ransomware far more quickly than previous systems. Ransomware is a type of malware. When a […]

Courtesy of: Verve Industrial

Six steps to effective patch management

Patch management in an operational technology (OT)/industrial control system (ICS) setting is full of challenges. From proprietary hardware and software to a lack of staff, inadequate or non-existent testing equipment, and regulatory reporting and system […]

The future of AI and cybersecurity: 2022 predictions

The future of AI and cybersecurity: 2022 predictions

Last year brought some of the most significant cyberattacks in history – from the Kaseya supply chain ransomware attack to cyber-criminals attempting to poison the water supply in Florida, to the already infamous Log4Shell vulnerability. […]

elliTek's IIoTA MES Gateway Appliance. Courtesy: elliTek

Cybersecurity and IT/OT convergence: How important is your data?

Manufacturers are under pressure to provide remote access and real-time data streams, while hoping keeping their facilities secure. While many have jumped in with reckless abandon, those manufacturers slower to adopt should learn from the […]

Courtesy: CFE Media and Technology

How to mitigate cloud security threats

Many people nowadays work in industries that largely rely on cloud computing to stay on top of their daily tasks. Moreover, the system allows people to seamlessly integrate as many employees as needed into any […]

Wires plugged into a network

Five levels of cybersecurity in an automated network

As manufacturers continue to adopt Industry 4.0 and IIoT technology, cybersecurity is becoming more and more critical with each passing day. Successfully protecting a network requires not only constant vigilance but strategies for securing an […]

IoT security: The threat before us

IoT security: The threat before us

Attackers are increasingly gaining footholds into corporate environments to conduct ransomware or data theft operations via Internet-connected smart devices. Whether they be printers, lockers, aquariums or conference rooms, these seemingly innocuous access points to corporate […]

Image of IT/OT convergence on a control panel

Four benefits from aligning IT, OT

As the Industrial Internet of Things (IIoT) and other data-centric concepts are realized in businesses and on factory floors all over the world, the practice of aligning operational technology (OT) and information technology (IT) is […]

How cyberattacks take down critical infrastructure

How cyberattacks take down critical infrastructure

The recent high-profile attacks against Colonial Pipeline and JBS Foods highlight that operational technology (OT) — the devices that drive gas flows and food processing, along with essentially all other machine-driven physical processes — does […]

Courtesy: GlobalData Distruptor Intelligence Center

GlobalData predicts future cybersecurity unicorns

Right from the network and data security to identity management and unified threat management (UTM), startups are offering cybersecurity solutions to identify vulnerabilities, thwart attacks and secure networks. Against this backdrop, the unicorn prediction model […]

Key takeaways from 2020 ICS-CERT vulnerabilities

Key takeaways from 2020 ICS-CERT vulnerabilities

In 2020, the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) issued 248 cybersecurity advisories for public consumption on the Cybersecurity and Infrastructure Security Agency’s (CISA) ICS-CERT portal. Verve analyzed all these advisories, regardless of whether […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Securing cloud data is a challenge for many companies

To accommodate remote work and improve efficiency, 85% of IT organizations are considering or already using the public cloud. However, with some of their most crucial data still located within the corporate perimeter, NetOps must come up […]

Smartphone apps may connect to vulnerable cloud servers

Smartphone apps may connect to vulnerable cloud servers

Cybersecurity researchers at Georgia Tech and Ohio State have discovered vulnerabilities in the backend systems that feed content and advertising to smartphone applications through a network of cloud-based servers that most users probably don’t even know exists.

Evaluating 2021 cyber threat landscape trends

Evaluating 2021 cyber threat landscape trends

As companies continue to adjust to the ever-evolving new normal in 2021, there will undoubtedly be additional shifts in work environments, internet usage, and the general status quo. With this in mind, Fortinet’s FortiGuard Labs’ Derek Manky […]

Courtesy: SAP

Five digital transformation trends in manufacturing for 2021

As much as the COVID-19 pandemic will be remembered for its chilling effect on business and economic activity, apparently it has had quite the opposite impact on industry’s zest for digital transformation and Industry 4.0 […]

How COVID-19 is affecting manufacturing cybersecurity

How COVID-19 is affecting manufacturing cybersecurity

Forward-looking organizations realize they need the same level of aggressiveness to protect assets as they have done for COVID-19 risk reduction. A three-pronged strategy on securing essential infrastructure is highlighted.

Cybersecurity Locks

Securing the IoT by design

There are several preventive measures that can be taken to secure industrial processes against cyber attacks.

How to manage IoT cybersecurity

How to manage IoT cybersecurity

The National Institute of Standards and Technology (NIST) has published a report to help organizations better understand and manage the cybersecurity and privacy risks associated with IoT devices throughout the devices’ lifecycles.

Ensuring IIoT cybersecurity best practices

Ensuring IIoT cybersecurity best practices

The Industrial Internet Consortium (IIC) has developed a white paper designed to bolster best practices related to the Industrial Internet of Things (IIoT) and data security.

Robotics

Improving cybersecurity in robotic automation

Cybersecurity in the robotics field is still immature, but manufacturers are starting to realize the vulnerability that connected robots and automation equipment creates in their operations.

Managing industrial Ethernet switches

Managing industrial Ethernet switches

While traditional industrial networks are using Ethernet switches to prepare for the Industrial Internet of Things (IIoT) applications, there is a place for unmanaged switches, though they come with some risks.

Protecting the production line in the Industrie 4.0, IIoT age

ICS/IIoT taxonomy needed for cybersecurity

There is many opinions and beliefs on what an industrial control system (ICS) is and what the Industrial Internet of Things (IIoT) comprises, which makes a common understanding crucial.

Courtesy: Virginia Tech

Simulating self-driving security

Road testing to improve self-driving security is expensive and time-consuming, but CCI researchers developed a virtual option.

Courtesy: Brett Sayles

Securing IIoT in the manufacturing industry

The Internet of Things (IoT) was evolving as a concept even before it was defined, with household objects quietly sprouting the ability to connect to the internet. Many of these devices have enriched lives to […]

Courtesy of CFE Media and Technology

Cybersecurity in the cloud: how to fortify your company

Power companies, chemical plants, hospitals and critical infrastructure rely on cloud-based services to monitor and control vital processes. This means cloud-managed facilities and industrial control systems (ICS) face omnipresent threats. Rapidly advancing technology, changing work […]

Courtesy: CFE Media

Why network discovery is critical in the ICS/IACS environment

Securing operational technology (OT) networks requires a great deal of thought when designing and implementing security. Industrial networks contain a complex mix of specialized protocols and devices, including proprietary protocols developed for specific families of […]

Courtesy: CFE Media

Stacking the deck for computer security

A new and more reliable method to defend vulnerable data on the stack, a major memory region responsible for storing computer program data for processes, has been developed by an international Penn State-led team. Such […]

Wires plugged into a network

How to secure Industry 4.0 in a highly connected world

As we head into the Industry 4.0 era — where connected Internet of Things (IoT) devices and automation will reshape industries — our world is already highly connected. According to Statista, there are more than […]

New approach allows for faster ransomware detection

New approach allows for faster ransomware detection

Engineering researchers have developed a new approach for implementing ransomware detection techniques, allowing them to detect a broad range of ransomware far more quickly than previous systems. Ransomware is a type of malware. When a […]

Courtesy of: Verve Industrial

Six steps to effective patch management

Patch management in an operational technology (OT)/industrial control system (ICS) setting is full of challenges. From proprietary hardware and software to a lack of staff, inadequate or non-existent testing equipment, and regulatory reporting and system […]

The future of AI and cybersecurity: 2022 predictions

The future of AI and cybersecurity: 2022 predictions

Last year brought some of the most significant cyberattacks in history – from the Kaseya supply chain ransomware attack to cyber-criminals attempting to poison the water supply in Florida, to the already infamous Log4Shell vulnerability. […]

elliTek's IIoTA MES Gateway Appliance. Courtesy: elliTek

Cybersecurity and IT/OT convergence: How important is your data?

Manufacturers are under pressure to provide remote access and real-time data streams, while hoping keeping their facilities secure. While many have jumped in with reckless abandon, those manufacturers slower to adopt should learn from the […]

Courtesy: CFE Media and Technology

How to mitigate cloud security threats

Many people nowadays work in industries that largely rely on cloud computing to stay on top of their daily tasks. Moreover, the system allows people to seamlessly integrate as many employees as needed into any […]

Wires plugged into a network

Five levels of cybersecurity in an automated network

As manufacturers continue to adopt Industry 4.0 and IIoT technology, cybersecurity is becoming more and more critical with each passing day. Successfully protecting a network requires not only constant vigilance but strategies for securing an […]

IoT security: The threat before us

IoT security: The threat before us

Attackers are increasingly gaining footholds into corporate environments to conduct ransomware or data theft operations via Internet-connected smart devices. Whether they be printers, lockers, aquariums or conference rooms, these seemingly innocuous access points to corporate […]

Image of IT/OT convergence on a control panel

Four benefits from aligning IT, OT

As the Industrial Internet of Things (IIoT) and other data-centric concepts are realized in businesses and on factory floors all over the world, the practice of aligning operational technology (OT) and information technology (IT) is […]

How cyberattacks take down critical infrastructure

How cyberattacks take down critical infrastructure

The recent high-profile attacks against Colonial Pipeline and JBS Foods highlight that operational technology (OT) — the devices that drive gas flows and food processing, along with essentially all other machine-driven physical processes — does […]

Courtesy: GlobalData Distruptor Intelligence Center

GlobalData predicts future cybersecurity unicorns

Right from the network and data security to identity management and unified threat management (UTM), startups are offering cybersecurity solutions to identify vulnerabilities, thwart attacks and secure networks. Against this backdrop, the unicorn prediction model […]

Key takeaways from 2020 ICS-CERT vulnerabilities

Key takeaways from 2020 ICS-CERT vulnerabilities

In 2020, the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) issued 248 cybersecurity advisories for public consumption on the Cybersecurity and Infrastructure Security Agency’s (CISA) ICS-CERT portal. Verve analyzed all these advisories, regardless of whether […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Securing cloud data is a challenge for many companies

To accommodate remote work and improve efficiency, 85% of IT organizations are considering or already using the public cloud. However, with some of their most crucial data still located within the corporate perimeter, NetOps must come up […]

Smartphone apps may connect to vulnerable cloud servers

Smartphone apps may connect to vulnerable cloud servers

Cybersecurity researchers at Georgia Tech and Ohio State have discovered vulnerabilities in the backend systems that feed content and advertising to smartphone applications through a network of cloud-based servers that most users probably don’t even know exists.

Evaluating 2021 cyber threat landscape trends

Evaluating 2021 cyber threat landscape trends

As companies continue to adjust to the ever-evolving new normal in 2021, there will undoubtedly be additional shifts in work environments, internet usage, and the general status quo. With this in mind, Fortinet’s FortiGuard Labs’ Derek Manky […]

Courtesy: SAP

Five digital transformation trends in manufacturing for 2021

As much as the COVID-19 pandemic will be remembered for its chilling effect on business and economic activity, apparently it has had quite the opposite impact on industry’s zest for digital transformation and Industry 4.0 […]

How COVID-19 is affecting manufacturing cybersecurity

How COVID-19 is affecting manufacturing cybersecurity

Forward-looking organizations realize they need the same level of aggressiveness to protect assets as they have done for COVID-19 risk reduction. A three-pronged strategy on securing essential infrastructure is highlighted.

Cybersecurity Locks

Securing the IoT by design

There are several preventive measures that can be taken to secure industrial processes against cyber attacks.

How to manage IoT cybersecurity

How to manage IoT cybersecurity

The National Institute of Standards and Technology (NIST) has published a report to help organizations better understand and manage the cybersecurity and privacy risks associated with IoT devices throughout the devices’ lifecycles.

Ensuring IIoT cybersecurity best practices

Ensuring IIoT cybersecurity best practices

The Industrial Internet Consortium (IIC) has developed a white paper designed to bolster best practices related to the Industrial Internet of Things (IIoT) and data security.

Robotics

Improving cybersecurity in robotic automation

Cybersecurity in the robotics field is still immature, but manufacturers are starting to realize the vulnerability that connected robots and automation equipment creates in their operations.

Managing industrial Ethernet switches

Managing industrial Ethernet switches

While traditional industrial networks are using Ethernet switches to prepare for the Industrial Internet of Things (IIoT) applications, there is a place for unmanaged switches, though they come with some risks.

Protecting the production line in the Industrie 4.0, IIoT age

ICS/IIoT taxonomy needed for cybersecurity

There is many opinions and beliefs on what an industrial control system (ICS) is and what the Industrial Internet of Things (IIoT) comprises, which makes a common understanding crucial.

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES