Protecting Traditional Stand Alone OT Systems As They Are Introduced To The IIoT
Re-Emagineering the CyberSecurity driven convergence of OT to IIOT The exploitation and sabotage of resources has been a concern to mission critical operations since the dawn of the industrial age. With the advancement of Information Technology (IT), opportunities to compromise, corrupt
Cybersecurity Tactics to Prevent Ransomware
Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid. More modern ransomware families, collectively categorized as crypto-ransomware, encrypt
The Immune System Approach – Cyber AI for Industrial Control Systems
The practice of cyber security has changed dramatically in the past few years, presenting a significant challenge to management teams across all industries and business domains. As IT security teams become accountable for securing Operational Technology (OT) and OT-specialist teams
Cybersecurity Tactics to Reduce ICS Software Supply Chain Risk
Supply chain attacks like the recent SolarWinds hack are now front-page news, and cybersecurity steps must be taken to reduce the risk these attacks pose to critical systems. A platform that enables end users to manage the security of their
The Clock is Ticking for a New Cyber Security Strategy
President Biden is walking into an embattled and in some ways grim cyber security picture. As we know, the end of 2020 brought to our attention a months-long global cyber-espionage campaign, The broader public will almost certainly never know the
[White Paper]Protecting the Embedded and IoT Software Build Environment with Software Composition Analysis
Ensuring the quality, reliability and safety of software requires navigating a complex supply chain made up of engineers, operations managers, contractors, and independent software vendors (ISVs), along with open source software (OSS) providers. Oftentimes, device manufacturers that have outsourced development
After a Cybersecurity Attack Like SolarWinds: Rebuilding a Network
In a recent article in The Guardian regarding the SolarWinds cybersecurity attack, security technologist Bruce Schneier said, "We have a serious problem. We don't know what networks they are in, how deep they are, what access they have, what tools they left," Schneier said. The
Digital Transformation: A One-Two Punch to Empower Employees and Protect Data
As the COVID-19 pandemic continues to impact business and the economy worldwide, companies in every industry are using a critical eye to prioritize their operations amidst shrinking budgets and a catalog of unknowns. This includes exploring automation technologies that can
Creating a Comprehensive Framework to Protect Operational Technology Assets
The ability to remotely manage systems including HVAC units, vehicle fleets, manufacturing equipment and other operational technologies (OT) is seen as a tremendous time and money saver. However, a failure to properly protect OT assets can lead to data theft,