Understanding and Mitigating Insider Threats in Operational Technology (OT) Systems
One of the biggest risks to operational technology (OT) security is not a zero-day rootkit, but the people onsite day in and day out.
What is IoT Security?
By answering some basic questions on IoT security and pointing you to other resources on how to minimize your IoT cybersecurity risk, this will help you better understand what a robust IoT security strategy looks like.
4 Steps to Take Now Toward Achieving CMMC Compliance
Your role in protecting sensitive defense information from cybersecurity threats is imminent. And so is your requirement to prove that you're up for the task.
With Increased Cyber Risk, OT Leaders Have an Opportunity to Shine
We've had multiple reminders in 2021 that digital connectivity of IT and OT infrastructure requires proportional attention risk management to proactively neutralize ransomware and full array of attack vector focused on industrial environments.
Understanding the Common Vulnerability Scoring System
The common vulnerability scoring system (CVSS) provides manufacturers a way to assess the principal characteristics of a vulnerability and produce a numerical score reflecting its severity.
Surviving a Global Cyberattack - Company Culture Plays a Pivotal Role
Let's go back so I can give you a short overview of what actually happened to Pilz. Sometime in May of 2019, the first phase of the attack was initiated - infection. In general, the infection phase consists of Emails with malicious attachments or links..
IA Targeted in Ethical Hacking Competition: What You Need to Know
The latest edition of the Pwn2Own hacking competition was held during the S4 security conference in Miami. The Zero Day Initiative, which hosts the competitions, aims to increase security awareness by promoting the ethical disclosure of software security vulnerabilities.
Assessment of Ransomware Event at U.S. Pipeline Operator
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) reported on 18 February 2020 on a ransomware incident impacting a natural gas compression facility at an unidentified U.S. pipeline operator.
Top Article for 2018 - Protecting Utilities
Minimising cyber security threats on industrial control systems. Without a strong commitment to security, manufacturers will fall victim to the many pitfalls faced by open protocols.
How to Keep Your Manufacturing Site Secure in the Age of the IIoT
Manufacturing sites of all kinds now find themselves potentially vulnerable to new types of cyber-attacks - the kinds that turn our own connected devices and equipment against us.
How the Manufacturing Industry Can Defend Against Cyberattacks
In the manufacturing industry, you have no option to continue ignoring the threat to your data. Digital security must take as much precedence, if not more, as the physical security of your facility.
Digital Transformations Carry Cybersecurity Concerns
The more digitized the manufacturing process becomes, the greater the potential for an attack if a manufacturer is not able to assure security measures on their identified assets
The Industrial IoT Risks You Must Not Ignore in 2018
Scott Allen for Sys-Con Media: Security, therefore, will ultimately be the limiting factor on how much IoT technology is deployed.
SCADAfence Secures $10 Million in Funding to Protect Smart Manufacturing and Critical Infrastructure Networks from Cyber Attacks
Investors include JVP, NexStar Partners and Japan's Global Brain; funds will be used to boost go-to-market efforts and expand research and development operations
Defending 3D Printers From Hackers
Charles Q. Choi for IEEE Spectrum: Researchers reveal three methods of verifying that 3d-printed parts have not been compromised by someone hacking the printer itself.
Records 1 to 15 of 27
Featured Product

ELATEC RFID Systems - Ensure only those authorized have access
With a tap of the badge, RFID readers from ELATEC provide secure, reliable and easy-to-use user authentication, access control and usage tracking of hardware and software in industrial automation processes. Reader durability in harsh plant floor environments is another essential feature. Choose the right authentication and access control solution and extend RFID card-based capability for the access control of PLC, robot and HMI automation controller software and devices requiring special operator training.