Search
Close this search box.

IT/OT

A team of Penn State researchers has developed a new hardware security device that takes advantage of microstructure variations to generate secure keys. Courtesy: Jennifer McCann/Penn State University

Graphene used to make encrypted keys harder to hack

As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits microscopic differences between computing components to create secure keys, […]

Courtesy: Moxa

How to ensure OT cybersecurity

Securing operational technology (OT) networks and increasing network durability are key to enhancing operational resilience, as OT network protection still lags information technology (IT) cybersecurity. This article explains the reasons behind the lag, how this gap manifests […]

SolarWinds’ impact on OT for manufacturers

SolarWinds’ impact on OT for manufacturers

The SolarWinds hack has been a major topic of discussion of late. The software is used to monitor applications and networks at thousands of companies and most importantly US Federal and State government departments and […]

Image courtesy: Brett Sayles

Keeping OT environments cybersecure

The convergence of information technology (IT) and operational technology (OT), the wider connectivity of OT with external networks, and the growing number of Industrial IoT (IIoT) devices, is helping to boost the efficiency of industrial […]

Image courtesy: Brett Sayles

How to protect marine renewable energy devices from cyberattacks

As marine renewable energy (MRE) developers prepare to deploy these technologies, efforts are underway to guard against cybersecurity threats that could threaten the function of a device and connected systems. Pacific Northwest National Laboratory (PNNL) created […]

Securing OT systems from cybersecurity attacks

Securing OT systems from cybersecurity attacks

As the technologies to bridge the divide between the worlds of information technology (IT) and operational technology (OT) within a plant have become more established, the digitalization of businesses has accelerated. The goal of this […]

Image courtesy: Brett Sayles

The challenge of securing all network edges

Hybrid networks, multi-cloud, Internet of Things (IoT), remote work and digital innovations are all driving more distributed networks and a much more expansive attack surface. The network perimeter that used to be so clearly defined now extends […]

Understand the cyber-attack lifecycle

Understand the cyber-attack lifecycle

A cyber kill chain provides a model for understanding the lifecycle of a cyber attack and helps those involved with critical infrastructure improve cybersecurity policies, technologies, training, and industrial control system (ICS) design. Learn 8 steps of one model.

The task of cybersecurity often falls to the IT department. But here are five questions every CISO should ask about OT cybersecurity.

How to protect embedded systems in OT cybersecurity

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are two pieces of information that can help guide you when understanding cybersecurity issues for embedded devices and the never-ending […]

A team of Penn State researchers has developed a new hardware security device that takes advantage of microstructure variations to generate secure keys. Courtesy: Jennifer McCann/Penn State University

Graphene used to make encrypted keys harder to hack

As more private data is stored and shared digitally, researchers are exploring new ways to protect data against attacks from bad actors. Current silicon technology exploits microscopic differences between computing components to create secure keys, […]

Courtesy: Moxa

How to ensure OT cybersecurity

Securing operational technology (OT) networks and increasing network durability are key to enhancing operational resilience, as OT network protection still lags information technology (IT) cybersecurity. This article explains the reasons behind the lag, how this gap manifests […]

SolarWinds’ impact on OT for manufacturers

SolarWinds’ impact on OT for manufacturers

The SolarWinds hack has been a major topic of discussion of late. The software is used to monitor applications and networks at thousands of companies and most importantly US Federal and State government departments and […]

Image courtesy: Brett Sayles

Keeping OT environments cybersecure

The convergence of information technology (IT) and operational technology (OT), the wider connectivity of OT with external networks, and the growing number of Industrial IoT (IIoT) devices, is helping to boost the efficiency of industrial […]

Image courtesy: Brett Sayles

How to protect marine renewable energy devices from cyberattacks

As marine renewable energy (MRE) developers prepare to deploy these technologies, efforts are underway to guard against cybersecurity threats that could threaten the function of a device and connected systems. Pacific Northwest National Laboratory (PNNL) created […]

Securing OT systems from cybersecurity attacks

Securing OT systems from cybersecurity attacks

As the technologies to bridge the divide between the worlds of information technology (IT) and operational technology (OT) within a plant have become more established, the digitalization of businesses has accelerated. The goal of this […]

Image courtesy: Brett Sayles

The challenge of securing all network edges

Hybrid networks, multi-cloud, Internet of Things (IoT), remote work and digital innovations are all driving more distributed networks and a much more expansive attack surface. The network perimeter that used to be so clearly defined now extends […]

Understand the cyber-attack lifecycle

Understand the cyber-attack lifecycle

A cyber kill chain provides a model for understanding the lifecycle of a cyber attack and helps those involved with critical infrastructure improve cybersecurity policies, technologies, training, and industrial control system (ICS) design. Learn 8 steps of one model.

The task of cybersecurity often falls to the IT department. But here are five questions every CISO should ask about OT cybersecurity.

How to protect embedded systems in OT cybersecurity

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are two pieces of information that can help guide you when understanding cybersecurity issues for embedded devices and the never-ending […]

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES