Category Archives: Cybersecurity

Medical Device Safety and Security: Obvious but not easy to achieve

With accelerating technology innovation, medical devices are becoming more sophisticated and more connected. Consequently, as in most mission-critical systems, safety and security are two increasingly vital requirements in medical device design. In April 2018, the U.S. Food & Drug Administration (FDA) announced plans to increase regulatory powers over medical device safety, including cybersecurity. This paper…
Read more

Linux vs QNX: 6 Considerations When Safety Certifying Embedded

Safety-certification of an embedded device can take a year or more and cost millions of dollars. Yet as many as 60% of products that companies attempt to safety certify fail to receive the desired stamp of approval. The losses are significant. At BlackBerry® QNX®, we’re changing that statistic for our customers with a near-100% success…
Read more

Supply Chain Economics and Cybersecurity

Let’s face it, supply chains are complex and distributed. Operations matter, and for some it is truly a miracle how many coordinated parts come together into a seamless operation. In fact, some manufacturers have tens of thousands of suppliers, from raw materials to hardware to firmware to software and everything in between.  As companies continually…
Read more

Cybersecurity and Data Concerns in 5G

For the advantages of 5G to be unlocked, ample preparation and planning are necessary. Looking at the changes 5G networks might bring about on an enterprise and its security is a good place to start. One of the first areas of concern in the implementation of 5G is the amount of data collected and how…
Read more

Extend the Lifecycle of Embedded Systems with a Hypervisor

Multiple embedded systems are at the heart of medical devices, transportation systems, automobiles, heavy equipment, and industrial robotics. In complex systems like these, a hypervisor provides the supervision to safely and reliably allowing separate functional software areas to share common hardware and resources. When it comes time to develop a new version of a system,…
Read more

IoT: Three Types of Security

IoT security will never be confused with Fort Knox. IoT needs to be secure in a way that is both technically and economically appropriate. But an IoT strategy that does not incorporate active security measures is not a strategy, but something more akin to hope. A recent ZDNet article called attention to LoRaWAN security vulnerabilities.…
Read more

Identifying Compromises Through Device Profiling

The Internet and our local networks have the ability to handle an amazing quantity of connections simultaneously. That strength leads to a problem when we’re trying to detect malicious traffic: how can we tell when one of our systems is sending traffic that it shouldn’t? In this article, I’ll show you how to detect these…
Read more

[New Report] Cybersecurity for smart factories

Almost half (40%) of manufacturers surveyed recently by Deloitte and the Manufacturers Alliance for Productivity & Innovation (MAPI) said their operations were impacted by a cyber incident in the past 12 months, and yet one in four have not performed a cyber risk assessment in the last year. This preparedness gap is becoming increasingly striking as manufacturers adopt more Smart…
Read more

Driving Through the Maze of Cyberthreats Within the Automotive Industry

Any connected device can be compromised. When we think of vulnerable devices, we immediately think of our phones, laptops, IoT devices, and even enterprise databases. We are moving into a world where our transportation system – cars, trucks, traffic lights, and trains – are becoming vulnerable as well. Before we go much further with this…
Read more

Facility Managers Guide to Building Systems and Cybersecurity

How to Assure Vendors Establish and Use a Cybersecurity Hygiene Don’t look now, but mainstream business leaders are learning that building systems may be the single biggest block of cybersecurity vulnerability in corporate America. Facility Managers, if you are one, can no longer be unaware, nor should they use traditional approaches to protect their turf…
Read more

Trend Micro teams up with Baker Hughes to address industrial cybersecurity challenges

Trend Micro, a global leader in cybersecurity solutions, announced that it will collaborate with Baker Hughes’ Nexus Controls operational technology (OT) security experts through a strategic framework agreement, signed in late 2019. Together the companies aim to provide comprehensive, industry leading guidance and support for enterprises running critical OT environments. The Industrial Internet of Things (IIoT)…
Read more

Is OT security ready for the next wave of cybercrime?

Forrester’s Predictions 2020: The Internet of Things report has an eye-opening forecast on cybercrime for the coming year – an IoT prediction that demands that we collectively consider how to strengthen OT security. We cannot close the door on connectivity’s many benefits. It’s clear that connectivity across people, assets, and systems empowers us to make…
Read more

[Use Case] Smart Grid and Distribution System Cybersecurity Protection

Smart grid is an evolving new power system framework with Information and Communication Technology (ICT) driven power equipment and a massively layered structure. The new generation sensors, smart meters and electronic devices are integral components of smart grid. However, the upcoming deployment of smart devices at different layers followed by their integration with communication networks…
Read more

Real Threats Logs From a Smart Factory Honeypot

Trend Micro just published the results of a six-month honeypot imitating an industrial factory. The highly sophisticated Operational Technology (OT) honeypot attracted fraud and financially motivated exploits. The six-month investigation revealed that unsecured industrial environments are primarily victims of common threats. The honeypot was compromised for cryptocurrency mining, targeted by two separate ransomware attacks, and…
Read more

5 Game Changers for Facilities Managers and Cybersecurity

The year 2019 produced important game changes that help Facilities Managers wage war against cyber attacks on Building Systems. Prior to 2019, Facilities stood on the sideline, hoping the IT department would protect their systems, which did not happen (and may never happen) for reasons explained below. With cybersecurity increasing the stakes for Facilities, these…
Read more

Video: cybersecurity of the next generation smart grid

As technology advances accelerate and Industry 4.0 continues to assimilate more and more areas of the Industrial world, the energy sector has come into the limelight as one of the top three most attacked critical infrastructure sectors in the U.S.  With the addition of more digital technologies to power plants, opportunities for cyberattack are only…
Read more

A New Approach to IIoT Security

As more operational technology (OT) devices and industrial control systems (ICSs) are connected to information technology (IT) systems over the Internet, the attack surface expands to billions of insecure devices, many of which cannot be patched. That in turn creates a massive population of new attack vectors against physical infrastructure – from power and water…
Read more

Cybersecurity Predictions for 2020

The year 2020 marks the transition to a new decade, and recent notable events and trends signify a similar changeover in the threat landscape. Cybersecurity in 2020 and beyond will have to be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to advancing technological developments and global threat intelligence — only…
Read more

The Recycling of Industrial Cyber-Attacks

How the Malware Dumpster Became Post-industrial Landfill For companies involved in critical infrastructure or any facet of manufacturing processes, one of the big action items today is securing OT. For the very first time, the security of the industrial computers (which run discrete and continuous processes such as PLCs, DCSs and HMIs) has eclipsed the…
Read more