Who Is Attacking Smart Factories? Understanding the Evolving Threat Landscape
· Cybersecurity

Who Is Attacking Smart Factories? Understanding the Evolving Threat Landscape

As manufacturing becomes more digitized and interconnected, the rise of cyberattacks targeting smart factories, industrial control systems (ICS), and operational technology (OT) has posed significant challenges for businesses worldwide. In recent years, ransomware attacks have become a prominent tool for cybercriminals, demonstrating how vulnerabilities in ICS environments can lead to severe operational disruptions. While the […]

Read more →
The 2021 Ransomware Survey Report
· Connected Industry

The 2021 Ransomware Survey Report

Fortinet recently surveyed 455 business leaders and cybersecurity professionals worldwide to gauge their state of readiness to defend against the growing challenge of ransomware. Most are very or extremely concerned about the threat of a ransomware attack, with many seeing those attacks as a more significant challenge than other cyber threats. The majority feel prepared […]

Read more →
Cybersecurity for Industrial Control Systems: Part 1
· Cybersecurity

Cybersecurity for Industrial Control Systems: Part 1

In this two-part series, we look into various cybersecurity threats that affected industrial control systems endpoints. We also discuss several insights and recommendations to mitigate such threats. The ever-changing technological landscape has made it possible for the business process on the IT side of an enterprise to be interconnected with the physical process on the […]

Read more →
How to Protect Against Ransomware in your OT Environment
· Connected Industry

How to Protect Against Ransomware in your OT Environment

Know how an IT attack can impact OT, build clear incident response gameplay, and prioritize risks to ensure as little impact on operations as possible in case of emergency.  Well-defined maps of potential threats and impacts. One of the biggest questions is the risk levels and priorities of assets and systems. What systems are tied […]

Read more →
Cybersecurity Nightmare = Ransomware + Software Supply Chain Attack
· ICS Security

Cybersecurity Nightmare = Ransomware + Software Supply Chain Attack

Recently, the Russia-based hacking group REvil, attacked the Florida-based software company Kaseya Ltd. If you’re not familiar with Kaseya, they provide network and security management services for small to medium-sized businesses (SMBs), not unlike what SolarWinds offers for large businesses. So this is yet another attack taking advantage of poor software security at companies that […]

Read more →
Cybersecurity Tactics to Prevent Ransomware
· Cybersecurity

Cybersecurity Tactics to Prevent Ransomware

Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files unless a ransom is paid. More modern ransomware families, collectively categorized as crypto-ransomware, encrypt certain file types on infected systems and forces users to pay the ransom through certain […]

Read more →
Use a Zero Trust Approach to Protect Your Smart Cities Projects from Hackers
· Cybersecurity

Use a Zero Trust Approach to Protect Your Smart Cities Projects from Hackers

Smart cities projects continue to gain momentum, given the need to address our aging infrastructure while enhancing the quality of life for both residents and visitors. New Internet of Things (IoT) and next generation network technologies like 5G enable smart parking, better traffic and mass transit control, smart lighting systems, and crime prevention. At the […]

Read more →
Using a Zero Trust Approach to Defeat Ransomware Attacks
· Cybersecurity

Using a Zero Trust Approach to Defeat Ransomware Attacks

The scourge of ransomware is not new, but recent months have seen a spate of fresh attacks on city governments. One high-profile example is Baltimore, which faced a lengthy system outage in May and June after refusing to pay the ransom demanded. The attack did come with a hefty price tag of an estimated $18 […]

Read more →
Trend Micro Cybersecurity Reference Architecture for Operational Technology
· Cybersecurity

Trend Micro Cybersecurity Reference Architecture for Operational Technology

The evolution of the Internet of Things (IoT) has made life a lot more convenient and productive for both consumers and businesses alike over past few years, but on the other side, cybersecurity is an emerging challenge. For automobile original equipment manufacturers (OEMs), Tier 1 suppliers, car dealers, service providers, car owners and drivers, cyberattacks […]

Read more →
Addressing the Threat of Ransomware
· Cybersecurity

Addressing the Threat of Ransomware

Recently there was a global ransomware cyberattack as never seen before. This single attack affected more than 200 000 computers and wreaked havoc on financial institutions, healthcare organizations and transportation to name just a few. This is the kind of attack that utilities and other critical infrastructure operators must guard against. “To put the problem […]

Read more →