Cybersecurity

Ron Brash, 31, Director of Cyber Security Insights, Verve Industrial Protection, Florissant, Mo., AS Information Technology & Applied Systems, Vancouver Island University, BS Technology, Security & Network Administration, British Columbia Institute of Technology, MS Computer Science, Concordia University
Events and Awards September 17, 2020

2020 Engineering Leader Under 40: Ron Brash, 31

Director of Cyber Security Insights, Verve Industrial Protection, Florissant, Mo., AS Information Technology & Applied Systems, Vancouver Island University, BS Technology, Security & Network Administration, British Columbia Institute of Technology, MS Computer Science, Concordia University

By Amanda Pelliccione
Courtesy: Keagan Gay, CFE Media and Technology
Cybersecurity September 16, 2020

Four tips on cybersecurity risk assessments

It’s hard to know how much cybersecurity spending is enough to lower risk to an acceptable level. What is enough and what else is needed? A cybersecurity risk assessment (CRA) can help. Four tips are highlighted.

By Erez Ravina and Atanu Niyogi
Courtesy: Keagan Gay, CFE Media and Technology
Cybersecurity September 10, 2020

Manage data flow to boost cyber-physical system performance

A suite of algorithms has been developed to improve the performance of cyber-physical systems by balancing each component’s need for data with how fast that data can be sent and received.

By Matt Shipman
Courtesy: Keagan Gay, CFE Media and Technology
Cybersecurity September 9, 2020

Remote teams struggling to mitigate cybersecurity risks

More workers are forced to work remotely due to COVID-19, but cybersecurity prevention and training is lagging behind.

By NordVPN Teams
Courtesy: Emerson
Cybersecurity September 7, 2020

Assessing cybersecurity today to improve tomorrow’s manufacturing operations

Simple strategies to achieve the most value from cyber risk assessments. Three strategies for operations technology (OT) teams to avoid while performing assessments are highlighted.

By Alexandre Peixoto and Rick Gorskie
Bar graph of cybersecurity products and services used: Respondents could check all the products and services that apply. The most universally used is anti-virus software by 91% of respondents. More than half use regular patch updates and firewall logs; 46% use network logs; 39% get help from the IT department. Six other product or services fall into the 36% to 31% range: Cybersecurity analytics/monitoring-internal, Patch updates-emergency, Instruction detection or prevention systems, Physical guards and port protection, Industrial control system cybersecurity tools, and Password audits. Courtesy: Control Engineering 2020 Cybersecurity Research Report
Cybersecurity September 5, 2020

Cybersecurity tips from subscribers

Cybersecurity advice about process, technologies, people (internal) and external threat resulted from the Control Engineering 2020 Cybersecurity Research Report. See graphic of technologies and services used online.

By Mark T. Hoske
Gain asset visibility and improve vulnerability prioritization and remediation with a 360-degree risk assessment. Courtesy: Verve Industrial
Cybersecurity September 3, 2020

How COVID-19 is affecting manufacturing cybersecurity

Forward-looking organizations realize they need the same level of aggressiveness to protect assets as they have done for COVID-19 risk reduction. A three-pronged strategy on securing essential infrastructure is highlighted.

By John Livingston
Seven unsafe gaps for industrial cybersecurity are 1) malware that moves from IT to OT and back; 2) Airgap believers; 3) Wondering worms from OT to IT; 4) Insecure controllers; 5) Negligent insiders, 6) Disgruntled employees; 7) Lack of planning until it’s too late. Courtesy: Tenable
Networking and Security August 30, 2020

Internet of vulnerable things: New industrial attack vectors

The Fourth Industrial Revolution has brought innovation and advanced technology, but it has also made these systems increasingly vulnerable. Industrial-grade cybersecurity is recommended.

By Michael Rothschild
Courtesy: Keagan Gay, CFE Media and Technology
Embedded Systems, Edge Computing August 25, 2020

Patching embedded systems aids cybersecurity efforts

Improving the process of patching code in vulnerable embedded systems is a major cybersecurity concern because much of the code currently running is vulnerable to hackers.

By Kelsey Schnieders Lefever
Courtesy: Chris Vavra, CFE Media
Cybersecurity August 19, 2020

Many industrial control systems can be exploited remotely

More than 70% of industrial control system (ICS) vulnerabilities disclosed in the first half of 2020 can be exploited remotely according to a report by Claroty.

By Claroty Research Team