Image courtesy: Brett Sayles
Cybersecurity August 24, 2021

The IT/OT convergence conundrum

Although a lot is being said about the pros and cons of information technology/operational technology (IT/OT) convergence, there is often little appreciation of what companies at different stages in their evolution may need to do.

By Edward Kessler
Courtesy: Verve Industrial/Coveware Quarterly Ransomware Report
Cybersecurity August 22, 2021

Managing the costs of OT cyber insurance

Cybersecurity insurance is a major aspect of risk management for many companies as attacks against operational technology increase. Four safeguards against ransomware are highlighted.

By John Livingston
Courtesy: Cynalytica
Cybersecurity August 21, 2021

An overlooked ICS cybersecurity gap for companies

A critical security gap that is widely ignored – the disparity between the attention applied between TCP/IP and serial network devices security.

By Cynalytica
Courtesy: Resiliant
Cybersecurity August 17, 2021

Cybersecurity maturity model certification (CMMC) for the U.S. DoD supply chain

Cybersecurity vulnerabilities and intrusions pose major risks to the Department of Defense (DoD) and its supply chain which is why the DoD is requiring compliance to CMMC

By Resiliant
Image courtesy: Brett Sayles
Cybersecurity August 16, 2021

How the American Jobs Plan could improve critical infrastructure cybersecurity

Provisions within the American Jobs Plan could improve critical infrastructure cybersecurity, but it's the first in many steps needed to make the nation safer from cyber attacks.

By Robert Fairfax
Courtesy: Velta Technology
Cybersecurity August 13, 2021

What OT teams can learn from IT strategies and structure

By applying information technology (IT) strategies and organization, operational technology (OT) teams would be able to monitor and manage cybersecurity measures more efficiently.

By Velta Technology
Image courtesy: Brett Sayles
Cybersecurity August 13, 2021

Ignoring cyber risk is dangerous to society and your bottom line

There continues to be a fundamental friction between the estimation of cyber risk and the short-term thinking of today’s quarterly budgetary decisions, which can lead to very bad results during the road.

By Robert Fairfax
Rakesh Verma, computer science professor at the UH College of Natural Sciences and Mathematics, leads the new CyberCops training program. Courtesty: University of Houston
Cybersecurity August 11, 2021

Training the next generation of cybercops

University of Houston's program recruits ROTC students as future cybersecurity gatekeepers.

By Sally Strong
Courtesy: Meditechsafe
Cybersecurity August 6, 2021

Three ways to ensure and optimize cybersecurity maturity

Cybersecurity maturity and optimization are crucial as attacks against operational technology (OT) continue increasing.

By MediTechSafe
Courtesy: Grantek
Cybersecurity August 5, 2021

Upgrading industrial PC cybersecurity in manufacturing

Cybersecurity attacks against manufacturers and other industrial sites are growing and companies need to develop a cybersecurity plan that protects industrial PCs and other vulnerable targets that, until recently, were not connected to the internet.

By Jeff Winter