Cybersecurity

IT-OT convergence drives technology innovation

September 22, 2023

Cybersecurity has become one of the primary challenges for IT/OT convergence. But the ongoing effort to integrate information technology with factory automation systems faces a wide range of challenges including connectivity, data collection, cloud integration, applications and updating issues.

Learn More

2023 Industrial Cybersecurity Progress Report

September 21, 2023

Industrial cybersecurity has become “Job One” for manufacturers to enable secure use of modern IT technologies in industrial networks, and seamless communications between IT, OT and cloud resources that require highly granular security policies based on identity and context for people, devices, and applications.

Learn More

Cybersecurity protects clinical trials

September 21, 2023

Manufacturing medicines for clinical trials is a complex, lengthy, and costly process. As the global demand for medicine continues to grow, the pressure is on for the pharma industry to produce in ever-quicker cycles.

Learn More

Building security boundaries to enhance industrial cybersecurity

September 21, 2023

A defense-in-depth concept allows companies to leverage their existing network infrastructure and investment to build the first line of their network defense. Industrial intrusion prevention systems and security boundary concepts can also further protect OT systems from a wide range of cyberattacks.

Learn More

From data to defense: the evolving role of industrial network security

September 21, 2023

Converging networking and security in industrial operations can enhance visibility within the organization, improve threat prevention, detection and response, simplify management, provide scalability and flexibility, and offer a crucial platform for IT-OT collaboration that can be built upon.

Learn More

Can IoT development go hand in hand with cybersecurity?

September 21, 2023

Cybersecurity is not a tick-box exercise but a fundamental part of grid modernisation in smart utilities and in smart city development. It needs to be a continuous effort from the beginning and then carefully considered at each stage of the design.

Learn More

Operational technology security at a glance

September 21, 2023

Establishing a complete and effective OT security program is a complex endeavor that differs from typical cybersecurity strategies. Ultimately, the goal is to maximize uptime by enabling operators to take targeted action to reduce and, where possible, minimize security breaches in OT environments.

Learn More

Securing industrial automation systems using IEC 62443-4-2

July 20, 2023

IEC 62443-4-2 host devices are independently evaluated and provide a secure-by-design open platform for industrial automation systems. Installing IIoT software and applications on these host devices creates an IIoT edge computing gateway that meets the industry’s gold standard for cybersecurity.

Learn More

Technical approaches to defend and protect IoT nodes

January 18, 2023

Creating a secure IoT node begins with a “root of trust”, a small affordable integrated circuit designed to offer security-related services to the node. Examples are data encryption for preserving confidentiality and digital signatures to ensure authenticity and integrity of information.

Learn More

Basis for an end-to-end security strategy

January 18, 2023

Managing assets as part of device and update management. Due to the development of automated tools for identifying resources and threats, industrial asset management plays a vital role in many industries where security operations are required. Asset management is not just crucial for software and IT companies.

Learn More