Cybersecurity

Image courtesy: Brett Sayles
Cybersecurity June 21, 2021

Differences between local and international cybersecurity standards

Understanding what is required at the local, national and international level when it comes to cybersecurity standards can reduce confusion.

By Massimiliano Latini and Pavel Kromov
Image courtesy: Brett Sayles
Cybersecurity June 16, 2021

Benefits of a multifunction platform for IT/OT security in the age of CMMC

As the Cybersecurity Maturity Model Certification (CMMC) rolls out, it’s important for manufacturing companies to think more broadly than just CMMC. 

By John Livingston
Image courtesy: Brett Sayles
Cybersecurity June 13, 2021

Unlikely cybersecurity targets are a myth

There is no such thing as an unlikely cybersecurity target and those who believe so are the most vulnerable to a potential attack.

By Dirk Sweigart
Image courtesy: Brett Sayles
Cybersecurity June 11, 2021

Control system cybersecurity tips and tactics released

NIST has developed an infographic with steps control system owners/operators can take now to get started or refreshed on their cybersecurity journey and to help manage their control system cybersecurity risks.

By Keith Stouffer and Victoria Yan Pillitteri
Image courtesy: Brett Sayles
Cybersecurity June 6, 2021

Disconnected cybersecurity systems are a myth

In today's modern manufacturing environment, there is no such thing as a "disconnected" system from cybersecurity, and believing systems that are among the most vulnerable.

By Dirk Sweigart
Image courtesy: Brett Sayles
Cybersecurity May 28, 2021

The importance of ICS security

Industrial control system (ICS) cybersecurity is growing in importance as cyber attacks increase and there are some basic tenets companies can follow in their journey.

By John Livingston
Image courtesy: Brett Sayles
Cybersecurity May 27, 2021

Six steps to an effective cybersecurity plan

Physical security, cybersecurity education, IT/OT separation and outsourcing when necessary are crucial to effective cybersecurity.

By Velta Technology
Courtesy: Cincinnati Incorporated/Steve Rourke, CFE Media and Technology
Cybersecurity May 20, 2021

Six steps for cyberattack incident response planning

Developing a strong cyberattack incident response plan requires a thorough examination of everything from building a response team to actually testing out the plan and ensuring it works.

By Velta Technology
Courtesy: Verve Industrial
Cybersecurity May 18, 2021

Benefits of OT system management for cybersecurity plans

Operational technology (OT) systems and networks needs to adopt the core elements of information technology system management (ITSM).

By John Livingston
Cybersecurity May 17, 2021

Is your IoT network putting you at risk of cyberattack?

Smart devices are growing in popularity, both at home and in the workplace, but is your IoT network putting you at risk of cyberattack? Here are some steps you can take to minimize risk.

By Claudia Jarrett