IIoT & Cloud

Courtesy: CFE Media

Why network discovery is critical in the ICS/IACS environment

Securing operational technology (OT) networks requires a great deal of thought when designing and implementing security. Industrial networks contain a complex mix of specialized protocols and devices, including proprietary protocols developed for specific families of […]

Courtesy: CFE Media

Stacking the deck for computer security

A new and more reliable method to defend vulnerable data on the stack, a major memory region responsible for storing computer program data for processes, has been developed by an international Penn State-led team. Such […]

Wires plugged into a network

How to secure Industry 4.0 in a highly connected world

As we head into the Industry 4.0 era — where connected Internet of Things (IoT) devices and automation will reshape industries — our world is already highly connected. According to Statista, there are more than […]

New approach allows for faster ransomware detection

New approach allows for faster ransomware detection

Engineering researchers have developed a new approach for implementing ransomware detection techniques, allowing them to detect a broad range of ransomware far more quickly than previous systems. Ransomware is a type of malware. When a […]

Courtesy of: Verve Industrial

Six steps to effective patch management

Patch management in an operational technology (OT)/industrial control system (ICS) setting is full of challenges. From proprietary hardware and software to a lack of staff, inadequate or non-existent testing equipment, and regulatory reporting and system […]

The future of AI and cybersecurity: 2022 predictions

The future of AI and cybersecurity: 2022 predictions

Last year brought some of the most significant cyberattacks in history – from the Kaseya supply chain ransomware attack to cyber-criminals attempting to poison the water supply in Florida, to the already infamous Log4Shell vulnerability. […]

Courtesy: CFE Media

Why network discovery is critical in the ICS/IACS environment

Securing operational technology (OT) networks requires a great deal of thought when designing and implementing security. Industrial networks contain a complex mix of specialized protocols and devices, including proprietary protocols developed for specific families of […]

Courtesy: CFE Media

Stacking the deck for computer security

A new and more reliable method to defend vulnerable data on the stack, a major memory region responsible for storing computer program data for processes, has been developed by an international Penn State-led team. Such […]

Wires plugged into a network

How to secure Industry 4.0 in a highly connected world

As we head into the Industry 4.0 era — where connected Internet of Things (IoT) devices and automation will reshape industries — our world is already highly connected. According to Statista, there are more than […]

New approach allows for faster ransomware detection

New approach allows for faster ransomware detection

Engineering researchers have developed a new approach for implementing ransomware detection techniques, allowing them to detect a broad range of ransomware far more quickly than previous systems. Ransomware is a type of malware. When a […]

Courtesy of: Verve Industrial

Six steps to effective patch management

Patch management in an operational technology (OT)/industrial control system (ICS) setting is full of challenges. From proprietary hardware and software to a lack of staff, inadequate or non-existent testing equipment, and regulatory reporting and system […]

The future of AI and cybersecurity: 2022 predictions

The future of AI and cybersecurity: 2022 predictions

Last year brought some of the most significant cyberattacks in history – from the Kaseya supply chain ransomware attack to cyber-criminals attempting to poison the water supply in Florida, to the already infamous Log4Shell vulnerability. […]

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES