Understanding the Common Vulnerability Scoring System

The common vulnerability scoring system (CVSS) provides manufacturers a way to assess the principal characteristics of a vulnerability and produce a numerical score reflecting its severity.

Surviving a Global Cyberattack - Company Culture Plays a Pivotal Role

Let's go back so I can give you a short overview of what actually happened to Pilz. Sometime in May of 2019, the first phase of the attack was initiated - infection. In general, the infection phase consists of Emails with malicious attachments or links..

IA Targeted in Ethical Hacking Competition: What You Need to Know

The latest edition of the Pwn2Own hacking competition was held during the S4 security conference in Miami. The Zero Day Initiative, which hosts the competitions, aims to increase security awareness by promoting the ethical disclosure of software security vulnerabilities.

Assessment of Ransomware Event at U.S. Pipeline Operator

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) reported on 18 February 2020 on a ransomware incident impacting a natural gas compression facility at an unidentified U.S. pipeline operator.

Top Article for 2018 - Protecting Utilities

Minimising cyber security threats on industrial control systems. Without a strong commitment to security, manufacturers will fall victim to the many pitfalls faced by open protocols.

How to Keep Your Manufacturing Site Secure in the Age of the IIoT

Manufacturing sites of all kinds now find themselves potentially vulnerable to new types of cyber-attacks - the kinds that turn our own connected devices and equipment against us.

How the Manufacturing Industry Can Defend Against Cyberattacks

In the manufacturing industry, you have no option to continue ignoring the threat to your data. Digital security must take as much precedence, if not more, as the physical security of your facility.

Digital Transformations Carry Cybersecurity Concerns

The more digitized the manufacturing process becomes, the greater the potential for an attack if a manufacturer is not able to assure security measures on their identified assets

The Industrial IoT Risks You Must Not Ignore in 2018

Scott Allen for Sys-Con Media: Security, therefore, will ultimately be the limiting factor on how much IoT technology is deployed.

SCADAfence Secures $10 Million in Funding to Protect Smart Manufacturing and Critical Infrastructure Networks from Cyber Attacks

Investors include JVP, NexStar Partners and Japan's Global Brain; funds will be used to boost go-to-market efforts and expand research and development operations

Defending 3D Printers From Hackers

Charles Q. Choi for IEEE Spectrum: Researchers reveal three methods of verifying that 3d-printed parts have not been compromised by someone hacking the printer itself.

The ioTrust Security Solution

Manufacturers who can uniquely identify individual parts in a secure manner have an advantage over the competition, which is struggling to master this new concept. With ioTrust, manufacturers can associate their products with a secure, unique identity, that can extend through the supply chain.

IIoT And The CyberThreat: A Perfect Storm Of Risk

Chris Grove for MBT Mag: Some organizations have a false sense of security and believe their industrial control systems cant be easily compromised.

Why PKI matters for the IIoT

Strong authentication of all devices within an IIoT network is one of the fundamental requirements for securing these networks.

Cybersecurity in the Factory

Technology for Industrial Control Systems and SCADA are now available that allow for continuous monitoring of these critical systems. A baseline is created and any deviations can be alerted and acted upon.

Records 1 to 15 of 23

Next | Last

Featured Product

Cirrus Link Solutions - No Code, No Fuss, Digital Transformation and the Connected Factory in minutes with Ignition and AWS

Cirrus Link Solutions - No Code, No Fuss, Digital Transformation and the Connected Factory in minutes with Ignition and AWS

In this webinar, Cirrus Link Solutions CTO and co-inventor of MQTT, Arlen Nipper, will discuss how to get OT data from Industrial applications and deliver it to AWS IoT SiteWise with minimal configuration and zero coding. Arlen will be joined by Thomas Cummins of AWS to describe the powerful data analytics tools available for big data analytics.With the use of Inductive Automation's Ignition platform, and Cirrus Link MQTT modules and Sparkplug SiteWise Bridge, properties and hierarchy are 100% self-discovered by SiteWise. Real time data is securely and efficiently delivered directly to the SiteWise time series database for Big Data Analytics, ML and AI. This solution provides the simplest data ingest for AWS SiteWise delivering the Digital Transformation organizations are striving to achieve.