Edge computing is a growing trend in manufacturing and business. So what exactly is edge computing, and what does it mean for information security?
Industrial control system (ICS) attacks are increasing and many of them can be performed with little skill required, which should be an alarm bell for many companies. Four preventive options are highlighted
Distributed network protocol 3.0 (DNP3) is a widely-used serial communications protocol for industrial control systems (ICSs) and is becoming a frequent target for hackers.
Having realistic expectations of addressing a threat and knowing how to respond in an emergency in an efficient way are essential.
The cybersecurity maturity model certification and NIST SP 800-171 Department of Defense (DoD) Assessment explained.
Although a lot is being said about the pros and cons of information technology/operational technology (IT/OT) convergence, there is often little appreciation of what companies at different stages in their evolution may need to do.
Cybersecurity insurance is a major aspect of risk management for many companies as attacks against operational technology increase. Four safeguards against ransomware are highlighted.
A critical security gap that is widely ignored – the disparity between the attention applied between TCP/IP and serial network devices security.
Cybersecurity vulnerabilities and intrusions pose major risks to the Department of Defense (DoD) and its supply chain which is why the DoD is requiring compliance to CMMC
Provisions within the American Jobs Plan could improve critical infrastructure cybersecurity, but it's the first in many steps needed to make the nation safer from cyber attacks.