Category Archives: Cybersecurity

Can blockchain address the Industrial IoT security?

Possible ICS security solution from the sensor to the cloud It seems like nowadays everyone is talking about this new buzzword called "blockchain". It's all over the Internet! What is blockchain? What's it used for? And how can it be helpful with Industrial IoT? In order to understand what blockchain is, let's first discuss another…
Read more

Why ICS cybersecurity is so challenging to get right: A Q&A with Barak Perelman

Changing business models and new regulatory requirements are accelerating the need for IT/OT convergence. IIoT enables unprecedented levels of real-time connectivity, dramatically increasing cybersecurity risks. Industrial control systems on OT networks have different operational requirements that impact the ability to adapt and respond to new threats – and open up new avenues for cyber attacks.…
Read more

12 predictions for ICS cybersecurity in 2018

This year was one of the most intense in terms of cybersecurity attacks affecting industrial control systems. For the first time since Stuxnet, a malicious toolset called CrashOverride/Industroyer targeted physical systems. However, the most significant threat to ICS security in 2017 was ransomware attacks. The WannaCry and Petya attacks appear to have changed forever the…
Read more

Cybersecurity, the 2018 Major Industrial Challenge?

Industrial systems’ cybersecurity has become a real concern for many companies since the Industry 4.0 and hyper-connection of equipment grew out. Executives are often unprepared and unarmed to face this new phenomenon. Nowadays, industrial systems make extensive use of information technologies even though they have not been designed to cope with the threats they introduce.…
Read more

9 Best Cybersecurity Practices for the IT/OT Environment

In the world of cybersecurity, there is no silver bullet. What you can do in your organization is to minimize the attack surfaces and threat vectors, and be vigilant and proactive in your defense against adversaries. To that end, we suggest that you implement a multilayered defense-in-depth cybersecurity strategy and stop the cyber threat early…
Read more

Preventing Malware Attacks with Network Monitoring Solutions

Unless you’re sleeping you know that cybersecurity is the single largest threat to your network uptime. “2016 saw a host of new cybersecurity threats and breaches – there are currently 578.7 million malware programs in existence, with four to five new malware threats per second,” according to AV-TEST’s Security Report 2015/16. That number is projected to rise to more…
Read more

Defending ICS and SCADA Systems from Cyber Attacks

As Operational Technologies (OT) for the Industrial Internet of Things (IIoT) proliferate and converge with enterprise IT systems, CSOs and CIOs need to assess the risks with their growing attack surface. Top of the list should be looking at the potential threats and attacks emanating from the network, given the convergence of OT and IT…
Read more

How to build a strong Industrial Cybersecurity routine

General Douglas MacArthur once said, “There is no security on this earth; there is only opportunity.”  These thoughts from a military man living in an analog world fit directly to today’s quest for smarter manufacturing in a safer environment. This is especially true in the globalized, regionalized, just-in-time business operations of today and tomorrow. Federal and…
Read more

Managing the Security Issues & Risks of Industrial IoT

To many people, the Internet of Things (IoT) seems like a new concept. They run around with the idea that IoT is a recent collection of Wi-Fi-enabled Internet-accessible gadgets, from coffee makers, soda machines and refrigerators to Google Glass and FitBits®. Though these are fun toys with some usefulness, most deliver limited utility. These devices are placed on the Internet…
Read more

Four most hard to solve IIoT security issues

According to a forecast by Gartner, the number of IoT devices in use will reach 8.4 billion in 2017 and grow to a staggering 20.4 billion by 2020, and the market opportunity for IoT will reach US$2 trillion by 2017. With the proliferation of IoT devices and technologies in the commercial and industrial sectors, we…
Read more

6 Tips to Protect Your Network From Malware Attacks

Malware attacks exploiting unprotected businesses can go undetected for months. Discover six ways in which you can future proof your network. “There’s a concerning trend in these supply-chain attacks,” says Craig Williams, the head of Cisco’s Talos team. “Attackers are realizing that if they find these soft targets, companies without a lot of security practices, they…
Read more

Size and complexity are the enemies of cybersecurity

In cybersecurity we are always faced with the chance that our system harbors some, unknown vulnerability, and the possibility that vulnerability will be discovered by some malicious actor who will then use it against our system, as well as other, similar systems. Cybersecurity vulnerabilities are the result of two kinds of errors or defects:design errors…
Read more

The Value of ICS Security

Nearly every presentation I give has at least a few audience members acknowledging to me that they weren’t really conscious of their own reliance on Industrial Control Systems (ICS) in so many aspects of their daily lives.  It’s difficult to avoid awareness of the Internet of Things (IoT), of course, with popular and business media…
Read more

A Historical Perspective on IT & OT Convergence

Hello IIoT World readers, and thanks for engaging with my column. Over the course of the next few months, I plan to write on a number of topics that are, individually, highly relevant to the IIoT Security realm.  Perhaps more importantly, many of these topics can be viewed as being all inter-related in a way that…
Read more

IoT Devices – with greater connectivity comes greater vulnerabilities

The Internet of Things (IoT) represents an exciting period of innovation in our lives. It describes a world of devices all connected to the internet, a world in which inanimate technology that we use and see every day is becoming smarter. It also predicts a continuous journey towards greater ease and convenience, a future in…
Read more

Industrial Espionage is a major threat to the Manufacturing Sector

Industrial espionage is nothing new. Theft of trade secrets and corporate intellectual property (IP) such as proprietary manufacturing processes, formulas, recipes, and product designs has been happening for decades. And you probably already know this if you work in industries such as manufacturing, pharmaceuticals, and chemicals. In fact, industrial espionage is sometimes credited for kick-starting…
Read more

Protecting IIoT with a New Approach to Cyber Defense

Measure, monitor and monetize has long been a mantra for any industry or corporation that  wants to be successful with its products or services. This capability is finally ubiquitous thanks to technology being powerful enough and cost effective enough to measure and track everything, from a smart football to complex Industrial systems. The Internet of Things…
Read more

Stop Downplaying Threats to Critical Infrastructure

It has been an incredibly busy three months in the world of Industrial Control Systems/Critical Infrastructure cybersecurity. A drop in the bucket for what we've become used to in the world of IT security - but incredibly noisy for this space – and an alarming precursor for what will come. Yes, we chose “will” come…
Read more