Keep watching the cybersecurity space for more action. Already this week, I wrote about two different approaches to industrial cybersecurity. Here is the story of an investment so that a company with history can pivot and go deeper into this market segment. PAS has been known improving alarm management and control system asset integrity. It […]
Tag Archives | critical infrastructure
Cyber Security is always the “elephant in the room” at Industrial Internet of Things (IIoT) and Industrial Control Systems (ICS) conferences. The latest edition of the ARC Industry Forum in Orlando featured many cyber security firms. Most were monitoring network traffic for anomalies. Some look at other aspects of the system. More firms are pivoting […]
Another big document dump hacked from the CIA points to more security risks for all of us–especially those working in critical infrastructure. Thoughts in podcast form from Gary.
Cyber protection takes on a number of forms. Most everything involves “defense in depth” strategies. I just talked with an Israeli company started by former security agents who has found a different vulnerability and counteracts it. This is the first of three press releases I’ve been sitting on for release today. I guess Nov. 15 is […]
Siemens invited a couple of writers to the Cincinnati area headquarters of PLM and a Cyber Security Center of Excellence to witness an internal presentation to Siemens employees. The presentation included both an overview of cyber security and the Siemens response plus Siemens’ plans to build a sizable business in the area. I was there […]
This partnership enhances both OT and IT cyber security for industrial smart manufacturing networks. SCADAfence, a pioneer in securing industrial networks in smart manufacturing industries, announced Feb. 24 an alliance with Check Point Software Technologies Ltd. This collaboration mitigates the inherent risks for manufacturers, such as operational downtime, process manipulation and theft of intellectual property, […]
SCADA devices and networks remain a prime target for cyber attacks. Everything I’ve written has approached cybersecurity from a different angle. This is the first solution that has come my way that uses a deception approach. Attivo Networks announced Dec. 7, 2015 a release of its deception-based Attivo BOTsink solution that provides continuous threat detection […]