Search
Close this search box.

Strategies

Image courtesy: Brett Sayles

How to improve cybersecurity with ODVA

ODVA, governing body for EtherNet/IP, DeviceNet and other protocols, stepped up cybersecurity with single-pair Ethernet (SPE) capabilities.

Figure 1 – General States of Zero Trust Maturity Adapted from CISA’s Zero Trust Maturity Model. Courtesy of: SANS Institute

Operating for zero trust

A zero trust mentality involves decisions across multiple pillars and organizational variables, informing the organization’s decisions.

Top 5 ICS Pulse Articles: July 2023

Top 5 ICS Pulse Articles: July 2023

The top 5 articles from July 2023 covered the riskiest OT devices, how AI will impact cybersecurity and challenges facing IT/OT convergence.

Equipment at a health care facility

Top 5 ICS Pulse Articles: June 2023

The top 5 articles from June 2023 covered zero-trust architecture, protecting MES and driving Industry 4.0 through IT/OT convergence.

Courtesy: Verve Industrial

2022 ICS advisory year in review

Analysis of the ICS advisory supports the development of appropriate strategies for their environments based on real-world risks.

Taking cybersecurity risks seriously

Taking cybersecurity risks seriously

Each new internet-connected device carries with it the burden of joining your network in accordance with latest cybersecurity practices.

Courtesy: Brett Sayles

What is critical infrastructure cybersecurity?

Critical infrastructure cybersecurity insights Critical infrastructure is very important to society and maintaining the basic needs of human life in modern times. Because of this, there is a need for critical infrastructure cybersecurity to protect […]

What is endpoint security?

What is endpoint security?

Endpoint security is the process of identifying, detecting, protecting and responding to cybersecurity threats at the device level.

Courtesy of: ISA

The ICS periodic table

ICS Insights It is crucial to have proper cybersecurity when it comes to industrial control systems. The ICS periodic table provides insights on the best practices of industrial cybersecurity on industrial control systems. It is […]

Courtesy: A3/Siemens

Preventing cybersecurity attacks against food, beverage facilities

Cybersecurity Insights As automation has become a regular feature of food processing facilities, the necessity for proper cybersecurity measures is more important than ever. It’s important to develop and implement a security awareness program, set […]

Courtesy: CFE Media and Technology

Improve two-factor authentication system security

As an extra layer of security, several online services have adopted push notification-based two-factor authentication systems, whereby users must approve login attempts through a mobile device. In current authentication systems, especially the “tap to approve” […]

Courtesy of CFE Media and Technology

University joins consortium to enhance cybersecurity

As the nature of digital warfare evolves, the need for a workforce trained in cybersecurity is critical for defending the United States from attacks. In response to the growing threat and the need for talent, […]

Courtesy: CFE Media and Technology

University plays leading role in $10 million cyberinfrastructure initiative

The CU Boulder-led initiative—MATCH, or Multi-tier Assistance, Training and Computational Help—is part of a larger program called Advanced Cyberinfrastructure Coordination Ecosystem: Services and Support (ACCESS). ACCESS is replacing the Extreme Science and Engineering Discovery Environment […]

Courtesy: Industrial Defender

Six ways to strengthen OT security

It’s been a tough year for cybersecurity teams. Critical infrastructure has faced an onslaught of cyberattacks, including high profile incidents like the Colonial Pipeline and JBS ransomware attacks and the Florida water treatment plant hack, and the situation doesn’t look […]

Courtesy: CFE Media and Technology

Why OT security teams turn to data diode TAPs

Air gaps and segmentation are common concepts to secure operational technology (OT) networks with the goal of minimizing the harm of a breach and threats by isolating it to a limited part of the network. Unless an […]

How ransomware hackers are trying to bribe employees

How ransomware hackers are trying to bribe employees

It has been said that anything is for sale for the right price, and that includes your most trusted employees. Bribes can turn trusted employees into malicious insiders who secretly help launch a ransomware attack […]

How to operate manufacturing remotely

Remote Operations: How to operate manufacturing effectively

Address five areas to improve remote operations, of growing importance to keep manufacturing sites running efficiently, reliably and safely from a distance, to address COVID-19 pandemic concerns and demographic workforce pressures. Secure software and devices can improve remote access, cybersecurity and digitization.

Protecting the production line in the Industrie 4.0, IIoT age

Understanding the impact of mobile cyberattacks

Manufacturers’ technology often wasn’t built to suppress today’s digital threats and with the advent of mobile technology in the workplace, it is easy for hackers to exploit this soft weaknesses.

Image courtesy: Brett Sayles

How to improve cybersecurity with ODVA

ODVA, governing body for EtherNet/IP, DeviceNet and other protocols, stepped up cybersecurity with single-pair Ethernet (SPE) capabilities.

Figure 1 – General States of Zero Trust Maturity Adapted from CISA’s Zero Trust Maturity Model. Courtesy of: SANS Institute

Operating for zero trust

A zero trust mentality involves decisions across multiple pillars and organizational variables, informing the organization’s decisions.

Top 5 ICS Pulse Articles: July 2023

Top 5 ICS Pulse Articles: July 2023

The top 5 articles from July 2023 covered the riskiest OT devices, how AI will impact cybersecurity and challenges facing IT/OT convergence.

Equipment at a health care facility

Top 5 ICS Pulse Articles: June 2023

The top 5 articles from June 2023 covered zero-trust architecture, protecting MES and driving Industry 4.0 through IT/OT convergence.

Courtesy: Verve Industrial

2022 ICS advisory year in review

Analysis of the ICS advisory supports the development of appropriate strategies for their environments based on real-world risks.

Taking cybersecurity risks seriously

Taking cybersecurity risks seriously

Each new internet-connected device carries with it the burden of joining your network in accordance with latest cybersecurity practices.

Courtesy: Brett Sayles

What is critical infrastructure cybersecurity?

Critical infrastructure cybersecurity insights Critical infrastructure is very important to society and maintaining the basic needs of human life in modern times. Because of this, there is a need for critical infrastructure cybersecurity to protect […]

What is endpoint security?

What is endpoint security?

Endpoint security is the process of identifying, detecting, protecting and responding to cybersecurity threats at the device level.

Courtesy of: ISA

The ICS periodic table

ICS Insights It is crucial to have proper cybersecurity when it comes to industrial control systems. The ICS periodic table provides insights on the best practices of industrial cybersecurity on industrial control systems. It is […]

Courtesy: A3/Siemens

Preventing cybersecurity attacks against food, beverage facilities

Cybersecurity Insights As automation has become a regular feature of food processing facilities, the necessity for proper cybersecurity measures is more important than ever. It’s important to develop and implement a security awareness program, set […]

Courtesy: CFE Media and Technology

Improve two-factor authentication system security

As an extra layer of security, several online services have adopted push notification-based two-factor authentication systems, whereby users must approve login attempts through a mobile device. In current authentication systems, especially the “tap to approve” […]

Courtesy of CFE Media and Technology

University joins consortium to enhance cybersecurity

As the nature of digital warfare evolves, the need for a workforce trained in cybersecurity is critical for defending the United States from attacks. In response to the growing threat and the need for talent, […]

Courtesy: CFE Media and Technology

University plays leading role in $10 million cyberinfrastructure initiative

The CU Boulder-led initiative—MATCH, or Multi-tier Assistance, Training and Computational Help—is part of a larger program called Advanced Cyberinfrastructure Coordination Ecosystem: Services and Support (ACCESS). ACCESS is replacing the Extreme Science and Engineering Discovery Environment […]

Courtesy: Industrial Defender

Six ways to strengthen OT security

It’s been a tough year for cybersecurity teams. Critical infrastructure has faced an onslaught of cyberattacks, including high profile incidents like the Colonial Pipeline and JBS ransomware attacks and the Florida water treatment plant hack, and the situation doesn’t look […]

Courtesy: CFE Media and Technology

Why OT security teams turn to data diode TAPs

Air gaps and segmentation are common concepts to secure operational technology (OT) networks with the goal of minimizing the harm of a breach and threats by isolating it to a limited part of the network. Unless an […]

How ransomware hackers are trying to bribe employees

How ransomware hackers are trying to bribe employees

It has been said that anything is for sale for the right price, and that includes your most trusted employees. Bribes can turn trusted employees into malicious insiders who secretly help launch a ransomware attack […]

How to operate manufacturing remotely

Remote Operations: How to operate manufacturing effectively

Address five areas to improve remote operations, of growing importance to keep manufacturing sites running efficiently, reliably and safely from a distance, to address COVID-19 pandemic concerns and demographic workforce pressures. Secure software and devices can improve remote access, cybersecurity and digitization.

Protecting the production line in the Industrie 4.0, IIoT age

Understanding the impact of mobile cyberattacks

Manufacturers’ technology often wasn’t built to suppress today’s digital threats and with the advent of mobile technology in the workplace, it is easy for hackers to exploit this soft weaknesses.

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES