Courtesy: Brett Sayles
Cybersecurity July 25, 2022

What’s behind the IT/OT divide?

The IT/OT divide comes from cultural differences, but the gap can be bridged by creating cross-functional teams, open communication and more.

By Dragos
Courtesy: Brett Sayles
Cybersecurity July 18, 2022

Improving your OT cybersecurity posture

Companies need to ask fundamental questions about where they stand with OT cybersecurity in the short- and long-term to improve their position.

By Kam Chumley and Ben Miller
Courtesy: CFE Media
Cybersecurity July 12, 2022

What critical infrastructure can learn from Conti Ransomware leaks

Attacks on critical infrastructure increased by 3,900% from 2013 to 2020 because of Ransomware gangs like Conti ransomware

By Verve Industrial
Image courtesy: Brett Sayles
Cybersecurity July 11, 2022

Three steps to building an ICS/OT roadmap

Companies realize they need to enhance their cybersecurity footprint, but often don't know how to start. Three steps to building a roadmap are highlighted.

By Dragos
Image courtesy: Brett Sayles
Cybersecurity July 10, 2022

The impact of proposed SEC cybersecurity rules on public companies

In March of 2022, the Securities and Exchange Commission (SEC) proposed amendments to its cybersecurity rules and regulations. The proposed changes would require reporting of cyber incidents and disclosure of cyber mitigation strategies, both leading to stronger relationships between chief information security officers (CISOs) and board-level decision makers.

By Mathias Mesich
Courtesy: MIT News
Cybersecurity July 6, 2022

Stronger security systems for smart devices

MIT researchers demonstrate two security methods that efficiently protect analog-to-digital converters from powerful attacks that aim to steal user data.

By Adam Zewe
Courtesy: Chris Vavra, CFE Media and Technology
Cybersecurity June 13, 2022

Smart manufacturing needs smart security, communication

The need for digital transformation in manufacturing is only as good as the security program behind it, which needs buy-in from all sides.

By Chris Vavra
Courtesy: Southwest Research Institute (SwRI)
Cybersecurity May 3, 2022

IDS developed for industrial control systems

Southwest Research Institute (SwRI) has developed an intrusion detection system (IDS) for industrial control systems (ICS) used in critical infrastructure and manufacturing systems.

By Southwest Research Institute (SwRI)
Courtesy of: Verve
Cybersecurity April 29, 2022

Four benefits of OT endpoint security asset management

How endpoint OT security asset management improves a CISO's ability to deliver measurable and rapid improvements to OT cybersecurity.

By Verve Industrial
Courtesy: Brett Sayles
Cybersecurity April 26, 2022

Adapting XDR for OT cybersecurity

These five adaptations of traditional IT XDR allow IT security teams to achieve effective and efficient multi-telemetry detection and response in OT environments.

By John Livingston