Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations

IT/OT

Courtesy of: Verve Industrial
Read More
  • IT/OT

Four benefits of OT endpoint security asset management

  • Rick Kaun
  • April 29, 2022
In information technology (IT), organizations have options to choose from to discover and aggregate asset information. In operation technology (OT), security asset management – discovery,…
Share
Richard Robinson, CEO of Cynalytica Inc.
Read More
  • IT/OT

Using Machine Learning to Protect OT: Expert Interview Series, Richard Robinson, Cynalytica

  • Gary Cohen
  • April 27, 2022
The last calendar year has been defined by cyberattacks. They’ve hit everyone from businesses to oil pipelines to hospitals, often bringing operations to a standstill and having…
Share
Courtesy: CFE Media
Read More
  • IT/OT

Adapting XDR for OT cybersecurity

  • John Livingston
  • April 26, 2022
Chief information security officers (CISOs) and directors of cybersecurity at industrial organizations continue to be frustrated at the challenge of applying core information technology (IT)…
Share
Read More
  • IT/OT

How Conti ransomware took down operational technology

  • Oakley Cox
  • April 25, 2022
Ransomware has taken the world by storm, and informational technology (IT) is not the only technology affected. Operational technology (OT), which is increasingly blending with IT, is also…
Share
As threat increases, college cybersecurity programs are more in demand
Read More
  • IT/OT

Dragos YIR report shows rise in threat groups, vulnerabilities and ransomware

  • Dragos
  • March 7, 2022
Dragos, Inc., a leader in cybersecurity for industrial control systems (ICS)/operational technology (OT) environments, recently released its fifth annual Dragos ICS/OT Cybersecurity Year in…
Share
Courtesy: Brett Sayles
Read More
  • IT/OT

Operational technology risk assessments and cybersecurity principles

  • Mark Gauvreau
  • March 2, 2022
Assessing and monitoring the security of operation technology (OT) systems can be aided by conducting an OT cybersecurity threat risk assessment (TRA). The process is fundamental to the…
Share
Courtesy: CFE Media
Read More
  • IT/OT

Using defensive deception to prevent IT/OT manufacturing threats

  • Lauren Thompson
  • March 1, 2022
Protecting information technology (IT) and operational technology (OT) networks is crucial to safeguarding the manufacturing industry. As part of the SecureAmerica’s Institute’s (SAI)…
Share
Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.
Read More
  • IT/OT

Operational technology risk assessments and security reviews

  • Mark Gauvreau
  • February 23, 2022
Protecting key resources and critical infrastructure (CI), such as healthcare, finance, transportation, telecommunications, energy, and water/wastewater is essential to security, public health…
Share
Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.
Read More
  • IT/OT

How ‘Think Global: Act Local’ can help manage OT security through COVID-19

  • John Livingston
  • February 8, 2022
In a rapidly changing world, we are grateful technology allows industrial organizations to operate their security and operational technology (OT) systems management quite effectively from a…
Share
Read More
  • IT/OT

How to implement a cybersecurity maturity model for the industrial space

  • Jim Fledderjohn
  • February 3, 2022
Most companies realize that implementing a cybersecurity maturity model is a smart move and a necessity in today’s world. The challenge for most companies is, where do they start? Let’s walk…
Share
SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Mitsubishi Electric - June 14, 2022
  • Meridian Cooperative - June 14, 2022
  • Johnson Controls - June 14, 2022
  • Microsoft - June 14, 2022
  • Citrix - June 14, 2022

RECENT NEWS

  • Protecting the power grid through cyber-physical threat response
  • How to secure Industry 4.0 in a highly connected world
  • Managing external connections to your operational technology (OT) environment
  • Webcast: Addressing Cybersecurity Challenges in Industry 4.0
  • How a desert water utility helped protect critical infrastructure

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT