Search
Close this search box.

IT/OT

Understand the cyber-attack lifecycle

Understand the cyber-attack lifecycle

A cyber kill chain provides a model for understanding the lifecycle of a cyber attack and helps those involved with critical infrastructure improve cybersecurity policies, technologies, training, and industrial control system (ICS) design. Learn 8 steps of one model.

The task of cybersecurity often falls to the IT department. But here are five questions every CISO should ask about OT cybersecurity.

How to protect embedded systems in OT cybersecurity

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are two pieces of information that can help guide you when understanding cybersecurity issues for embedded devices and the never-ending […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Protecting the chip industry supply chain from cyberattacks

Intellectual property (IP) is the lifeblood of today’s globally integrated microelectronics supply chain. Protecting confidential information is vital to electronics companies around the world. The industry’s central role in ensuring the national security and economic […]

Mitigating OT cybersecurity risks, enforcing best practices

Mitigating OT cybersecurity risks, enforcing best practices

Cybersecurity has become one of the most significant financial and reputational risks for an organization. Examples of the ever-increasing cybersecurity threats include: More than 22 government entities in Texas, Florida, Maryland and Georgia faced recent […]

The task of cybersecurity often falls to the IT department. But here are five questions every CISO should ask about OT cybersecurity.

Five questions every CISO should ask about OT cybersecurity

Who should be involved in the OT cybersecurity program? This is the first question for a reason. In many information technology (IT) organizations, the answer is clear. Security requires networking, endpoint, cloud, regulatory and other […]

Extend IT security to the plant floor

Extend IT security to the plant floor

Cybersecurity is critical as information technology (IT) and operations technology (OT) converge, which is the first step in making the transition between the two sides almost seamless.

Industrial control system (ICS) cybersecurity threats are increasing. A cybersecurity management system (CSMS) overviews the elements required for an organization to evaluate its current risks, how to address them and keep its CSMS updated. Claroty research shows 70% of cybersecurity vulnerabilities derive from the network. Courtesy: Claroty

Growing ICS vulnerabilities mandate prioritization

Learning Objectives ICS cybersecurity threats are increasing. Industrial networked devices, engineering workstation, remote sites may be sources of cybersecurity vulnerabilities. Standards and best practices, consistently applied, can decrease cybersecurity risk. It’s no secret information technology […]

Understand the cyber-attack lifecycle

Understand the cyber-attack lifecycle

A cyber kill chain provides a model for understanding the lifecycle of a cyber attack and helps those involved with critical infrastructure improve cybersecurity policies, technologies, training, and industrial control system (ICS) design. Learn 8 steps of one model.

The task of cybersecurity often falls to the IT department. But here are five questions every CISO should ask about OT cybersecurity.

How to protect embedded systems in OT cybersecurity

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are two pieces of information that can help guide you when understanding cybersecurity issues for embedded devices and the never-ending […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Protecting the chip industry supply chain from cyberattacks

Intellectual property (IP) is the lifeblood of today’s globally integrated microelectronics supply chain. Protecting confidential information is vital to electronics companies around the world. The industry’s central role in ensuring the national security and economic […]

Mitigating OT cybersecurity risks, enforcing best practices

Mitigating OT cybersecurity risks, enforcing best practices

Cybersecurity has become one of the most significant financial and reputational risks for an organization. Examples of the ever-increasing cybersecurity threats include: More than 22 government entities in Texas, Florida, Maryland and Georgia faced recent […]

The task of cybersecurity often falls to the IT department. But here are five questions every CISO should ask about OT cybersecurity.

Five questions every CISO should ask about OT cybersecurity

Who should be involved in the OT cybersecurity program? This is the first question for a reason. In many information technology (IT) organizations, the answer is clear. Security requires networking, endpoint, cloud, regulatory and other […]

Extend IT security to the plant floor

Extend IT security to the plant floor

Cybersecurity is critical as information technology (IT) and operations technology (OT) converge, which is the first step in making the transition between the two sides almost seamless.

Industrial control system (ICS) cybersecurity threats are increasing. A cybersecurity management system (CSMS) overviews the elements required for an organization to evaluate its current risks, how to address them and keep its CSMS updated. Claroty research shows 70% of cybersecurity vulnerabilities derive from the network. Courtesy: Claroty

Growing ICS vulnerabilities mandate prioritization

Learning Objectives ICS cybersecurity threats are increasing. Industrial networked devices, engineering workstation, remote sites may be sources of cybersecurity vulnerabilities. Standards and best practices, consistently applied, can decrease cybersecurity risk. It’s no secret information technology […]

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES