Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations

Networks

Courtesy: Brett Sayles
Read More
  • Networks

Managing external connections to your operational technology (OT) environment

  • Miriam Lorbert
  • June 21, 2022
Dragos recently published the Dragos 2021 Year In Review report, which highlighted four key findings within the operational technology (OT) cyber threat landscape. This blog continues the…
Share
SwRI used programmable logic controllers (PLCs) connected to input/output (I/O) modules to a test network. Algorithms scanned the network for cyberattacks through data packets transferred over the Modbus/TCP protocol. Courtesy: Southwest Research Institute (SwRI)
Read More
  • Networks

IDS developed for industrial control systems

  • Southwest Research Institute
  • May 3, 2022
Southwest Research Institute has developed technology to help government and industry detect cyber threats to industrial networks used in critical infrastructure and manufacturing systems.…
Share
Six key constituents can drive targeted solutions to the ICS environment: 1. Audit and application of security policies and procedures; 2. Access controls with secure data transfers; 3. Threat detection of abnormal and malicious activity at all levels of the ICS infrastructure; 4. Risk management and mitigation; 5. Process sensors security and authentication; and 6. Resolution of key security problems that requires intrinsic relationship with vendors. Courtesy: MG Strategy+, Control Engineering
Read More
  • Networks

Six critical components of integrated cybersecurity for industrial control systems (ICS)

  • Anil Gosine
  • January 18, 2022
Learning Objectives Examine six ways to approach industrial cybersecurity. Look at internal and external industrial cybersecurity threats, without silos. Learn that legacy process sensors lack…
Share
Figure 1: To determine effectiveness and maturity, take a particular control and plot the effectiveness score on the Y-axis of a graph and the DMS on the X-axis of the graph. By seeing which quadrant the result falls into, people can quickly make some general statements about the systems under consideration. Courtesy: Maverick Technologies
Read More
  • Networks

Securing the ICS: Measure solution effectiveness, maturity

  • Robert Henderson
  • December 27, 2021
Many articles focused on cybersecurity stress how important it is to secure an industrial control system (ICS) and share ways to implement this security. In this article, the assumption is…
Share
elliTek's IIoTA MES Gateway Appliance. Courtesy: elliTek
Read More
  • Networks

Cybersecurity and IT/OT convergence: How important is your data?

  • Brandon Ellis
  • December 20, 2021
Manufacturers are under pressure to provide remote access and real-time data streams, while hoping keeping their facilities secure. While many have jumped in with reckless abandon, those…
Share
Courtesy: Brett Sayles
Read More
  • Networks

NERC CIP checklist for identification and categorization of BES cyber assets

  • Mathias Mesich
  • November 19, 2021
The North American Electric Reliability Corporation (NERC) maintains the critical infrastructure protection (CIP) security standards. These protocols coordinate security practices for major…
Share
Read More
  • Networks

How serial-to-Ethernet converters help attackers breach cyber-physical assets

  • Cynalytica
  • August 29, 2021
In industrial automation, serial-to-Ethernet converters/gateways and serial device servers are a widely used method for enabling remote communications and monitoring of devices that only…
Share
Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.
Read More
  • Networks

An overlooked ICS cybersecurity gap for companies

  • Cynalytica
  • August 20, 2021
Cyber attacks on critical infrastructure’s industrial control systems (ICS) are still on the rise due, for the most part, to the increase in cybercrime and geopolitical tensions – tensions…
Share
Figure 4: The risk management cycle, and incorporation of Industry 4.0 goals for security controls implementation. Courtesy: Grantek
Read More
  • Networks

Upgrading industrial PC cybersecurity in manufacturing

  • Jeff Winter
  • August 5, 2021
Learning Objectives Cybersecurity attacks against manufacturers and other industrial sites are growing every year. When developing a cybersecurity plan, is best to look at it through the lens…
Share
Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.
Read More
  • Networks

Three benefits of a 360-degree vulnerability assessment

  • Rick Kaun
  • July 16, 2021
Defending critical infrastructure environments requires 360-degree visibility into asset and network vulnerabilities, which is why a vulnerability assessment is so important. Vulnerability…
Share
SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Mitsubishi Electric - June 14, 2022
  • Meridian Cooperative - June 14, 2022
  • Johnson Controls - June 14, 2022
  • Microsoft - June 14, 2022
  • Citrix - June 14, 2022

RECENT NEWS

  • Protecting the power grid through cyber-physical threat response
  • How to secure Industry 4.0 in a highly connected world
  • Managing external connections to your operational technology (OT) environment
  • Webcast: Addressing Cybersecurity Challenges in Industry 4.0
  • How a desert water utility helped protect critical infrastructure

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT