Commercial Availability of Self-Service Cyberhardening Technology
RunSafe Security, the pioneer of a patented cyberhardening process for vulnerable embedded systems, devices and industrial control systems (ICS), has announced the commercial availability of Alkemist, a proprietary self-service technology built to reduce vulnerabilities and deny malware the uniformity needed to
US Intelligence says Cyber Threat Warning Lights are Blinking Red
Why Industrial Operations are not Immune Recently, US intelligence chief Dan Coats remarked in a talk at the Hudson Institute that ‘the warning lights are blinking red again' on cyber attacks, as they were before the Sept 11 attacks in 2001. While
Michael Rothschild, Senior Director of Marketing
Michael Rothschild is Senior Director of Marketing at Indegy and has more than 20 years of experience in IT security. Michael has worked in product management and marketing roles with Thales, RSA, SafeNet (now Gemalto), Dell, Juniper Networks and Radware. In
Smart Sensors Increasingly Important in the Industrial IoT Age
While there is no single standard that could be applied to support a claim that a sensor is “smart,” Smart Sensors are typically characterized by on-board intelligence and the ability to communicate via a digital network. With the emergence of
Sid Snitkin, Ph.D., Vice-President
Sid Snitkin is a senior member of ARC Advisory Group where he has primary responsibility for developing the strategic direction for ARC’s cyber security products and services. Sid has over 30 years of experience in automation, information systems, and manufacturing,
Guy AlLee, Product Manager
Guy AlLee is a computer industry veteran with over 30 years of experience in computer architecture, hardware, software, energy, security and the Internet of Things (IoT), and has an MS in Computer Engineering. He is Product Manager for IoT Security
Dean Weber, CTO
With more than 43 years of experience in information and physical security, Dean leads Mocana as Chief Technology Officer after serving as director and CTO at CSC Global CyberSecurity. CTO at Applied Identity, acquired by Citrix Chief Security Architect at Teros, a leading manufacturer
What you need to know about Manufacturing Analytics
In the past, if you wanted to know how a machine was performing on a shop floor, you would have had to put pencil to paper and note the output, the error rate, the quality, all manually. You would have
Use of IoT and OEE for improving the performance of production
Overall Equipment Effectiveness (OEE) is the most reliable practices metric for measuring manufacturing productivity. OEE is used as a baseline and benchmark to measure the utilization of a manufacturing operation or piece of equipment. Many uses OEE numbers to trace the
The state of auto cybersecurity: current vulnerabilities in connected vehicles
As the automotive industry adds more software and connections into vehicles, it simultaneously increases the probability of cyberattacks due to vulnerabilities. Right now, the average car has about 100 million lines of software code and 100 electronic control unit (ECUs),
Is Malware hiding in your ICS Network?
Most industrial organizations still consider their ICS networks to be safe from common cyber threats that mainly target IT networks. However, two recent cryptocurrency mining incidents demonstrate that ICS networks are not "sterile" from unwanted software. Moreover, the fact that these cyber incidents
Simon Hartley, Strategic Accounts
Mr. Hartley works with government customers at CIS Mobile with its altOS mobile security platform. He also worked with Apple and Samsung in hardening their mobile devices for U.S. government use and is a frequent speaker on cybersecurity at industry