Managing external connections to your operational technology (OT) environment
Dragos recently published the Dragos 2021 Year In Review report, which highlighted four key findings within the operational technology (OT) cyber threat landscape. This blog continues the…
Share
IDS developed for industrial control systems
Southwest Research Institute has developed technology to help government and industry detect cyber threats to industrial networks used in critical infrastructure and manufacturing systems.…
Share
Six critical components of integrated cybersecurity for industrial control systems (ICS)
Learning Objectives Examine six ways to approach industrial cybersecurity. Look at internal and external industrial cybersecurity threats, without silos. Learn that legacy process sensors lack…
Share
Securing the ICS: Measure solution effectiveness, maturity
Many articles focused on cybersecurity stress how important it is to secure an industrial control system (ICS) and share ways to implement this security. In this article, the assumption is…
Share
Cybersecurity and IT/OT convergence: How important is your data?
Manufacturers are under pressure to provide remote access and real-time data streams, while hoping keeping their facilities secure. While many have jumped in with reckless abandon, those…
Share
NERC CIP checklist for identification and categorization of BES cyber assets
The North American Electric Reliability Corporation (NERC) maintains the critical infrastructure protection (CIP) security standards. These protocols coordinate security practices for major…
Share
How serial-to-Ethernet converters help attackers breach cyber-physical assets
In industrial automation, serial-to-Ethernet converters/gateways and serial device servers are a widely used method for enabling remote communications and monitoring of devices that only…
Share
An overlooked ICS cybersecurity gap for companies
Cyber attacks on critical infrastructure’s industrial control systems (ICS) are still on the rise due, for the most part, to the increase in cybercrime and geopolitical tensions – tensions…
Share
Upgrading industrial PC cybersecurity in manufacturing
Learning Objectives Cybersecurity attacks against manufacturers and other industrial sites are growing every year. When developing a cybersecurity plan, is best to look at it through the lens…
Share
Three benefits of a 360-degree vulnerability assessment
Defending critical infrastructure environments requires 360-degree visibility into asset and network vulnerabilities, which is why a vulnerability assessment is so important. Vulnerability…
Share