Cybersecurity

Cybersecurity September 2, 2021

Fearlessly implement cybersecurity at the edge

Edge computing is a growing trend in manufacturing and business. So what exactly is edge computing, and what does it mean for information security?

By Gary Cohen
Courtesy: Verve Industrial
Cybersecurity August 29, 2021

Takeaways from 2020 ICS vulnerabilities report

Industrial control system (ICS) attacks are increasing and many of them can be performed with little skill required, which should be an alarm bell for many companies. Four preventive options are highlighted

By Ron Brash
Image courtesy: Brett Sayles
Cybersecurity August 27, 2021

Improve legacy critical infrastructure protection

Distributed network protocol 3.0 (DNP3) is a widely-used serial communications protocol for industrial control systems (ICSs) and is becoming a frequent target for hackers.

By Cynalytica
Having realistic expectations of addressing a threat and knowing how to respond in an emergency in an efficient way are essential.
Cybersecurity August 26, 2021

Importance of operational resilience in a threat landscape

Having realistic expectations of addressing a threat and knowing how to respond in an emergency in an efficient way are essential.

By Christina Miller
Courtesy: Resiliant
Cybersecurity August 24, 2021

What to know if conducting business with the U.S. DoD

The cybersecurity maturity model certification and NIST SP 800-171 Department of Defense (DoD) Assessment explained.

By Resiliant
Image courtesy: Brett Sayles
Cybersecurity August 24, 2021

The IT/OT convergence conundrum

Although a lot is being said about the pros and cons of information technology/operational technology (IT/OT) convergence, there is often little appreciation of what companies at different stages in their evolution may need to do.

By Edward Kessler
Courtesy: Verve Industrial/Coveware Quarterly Ransomware Report
Cybersecurity August 22, 2021

Managing the costs of OT cyber insurance

Cybersecurity insurance is a major aspect of risk management for many companies as attacks against operational technology increase. Four safeguards against ransomware are highlighted.

By John Livingston
Courtesy: Cynalytica
Cybersecurity August 21, 2021

An overlooked ICS cybersecurity gap for companies

A critical security gap that is widely ignored – the disparity between the attention applied between TCP/IP and serial network devices security.

By Cynalytica
Courtesy: Resiliant
Cybersecurity August 17, 2021

Cybersecurity maturity model certification (CMMC) for the U.S. DoD supply chain

Cybersecurity vulnerabilities and intrusions pose major risks to the Department of Defense (DoD) and its supply chain which is why the DoD is requiring compliance to CMMC

By Resiliant
Image courtesy: Brett Sayles
Cybersecurity August 16, 2021

How the American Jobs Plan could improve critical infrastructure cybersecurity

Provisions within the American Jobs Plan could improve critical infrastructure cybersecurity, but it's the first in many steps needed to make the nation safer from cyber attacks.

By Robert Fairfax