How Do You Secure OT When AI Writes the Malware?
When agentic AI can write attack code and deploy it autonomously, securing OT networks requires removing the inbound attack surface entirely. At Hannover Messe 2026, Skkynet CEO Gary Tillery describes how the company’s outbound-only architecture does…
Removable Media Is Still OT’s Biggest Blind Spot
A plant operator plugged a personal phone into an HMI to charge it and accidentally tethered the device, giving an air-gapped control system a live internet connection. At another site, the cybersecurity lead walked through the…
How One Utility Secured 650,000 Power Connections
IIoT World covers OT cybersecurity for energy infrastructure, including removable media risks, air gap strategies, and ICS security frameworks for renewable energy operators. With estimated cybercrime costs reaching $10.5 trillion between 2020 and 2025, the energy…
Achieving Regulatory Compliance for Connected Devices in Global Smart Manufacturing & Critical Infrastructure
Regulatory compliance for connected devices represents a foundational business requirement for Original Equipment Manufacturers and asset operators. This IIoT World article maps the global regulatory landscape across IEC 62443, the EU Cyber Resilience Act, NIS2, and…
Securing Automation: Why the Specification Stage Is the Right Time to Embed OT Cybersecurity
Only 19% of manufacturers plan to invest in cybersecurity despite 56% planning new automation projects in 2026, according to the Sikich Industry Pulse survey. IIoT World covers OT cybersecurity strategy through practitioner articles, case studies, and…
Cybersecurity Upside Down: Why Detection is a Losing Game for ICS in 2026
The industrial sector is at a crossroads. As we navigate 2026, the traditional “detection-first” mindset that has governed OT (Operational Technology) cybersecurity for decades is proving insufficient against the rise of autonomous, AI-driven threats.During an interview at S4x26 in…
Six ICS/OT Cybersecurity Solutions for 2026: Securing the Air Gap
In 2026, the traditional “air gap” is a logical challenge. The convergence of IT and OT, coupled with AI-driven threats, has rendered “security by obscurity” obsolete. To maintain operational resilience, industrial leaders are shifting their focus…
AI in Manufacturing Introduces a New Risk: Can You Trust What the Model Learned?
Why AI risk in factories is no longer just a cybersecurity issueManufacturers are beginning to use AI in areas that influence real operational decisions: quality analysis, anomaly detection, process optimization, and predictive maintenance. As this accelerates,…
Why Your AI Strategy is Failing the Audit: The Provenance Gap in Manufacturing
In the race to automate, many manufacturers are hitting a wall. It is not a lack of processing power or a shortage of LLMs. It is a trust problem. The “bottleneck” to scaling AI in the…
The Shop Floor Is Still the Weakest Link in Industrial Cybersecurity
Why modern factories remain dangerously exposedIIoT World covers industrial cybersecurity risks at the shop floor level through practitioner articles and ICS Cybersecurity Day on October 14, 2026. Manufacturers invest heavily in IT security, cloud controls, and…