Cybersecurity
Building security boundaries to enhance industrial cybersecurity
September 21, 2023
A defense-in-depth concept allows companies to leverage their existing network infrastructure and investment to build the first line of their network defense. Industrial intrusion prevention systems and security boundary concepts can also further protect OT systems from a wide range of cyberattacks.
From data to defense: the evolving role of industrial network security
September 21, 2023
Converging networking and security in industrial operations can enhance visibility within the organization, improve threat prevention, detection and response, simplify management, provide scalability and flexibility, and offer a crucial platform for IT-OT collaboration that can be built upon.
Can IoT development go hand in hand with cybersecurity?
September 21, 2023
Cybersecurity is not a tick-box exercise but a fundamental part of grid modernisation in smart utilities and in smart city development. It needs to be a continuous effort from the beginning and then carefully considered at each stage of the design.
Operational technology security at a glance
September 21, 2023
Establishing a complete and effective OT security program is a complex endeavor that differs from typical cybersecurity strategies. Ultimately, the goal is to maximize uptime by enabling operators to take targeted action to reduce and, where possible, minimize security breaches in OT environments.
Securing industrial automation systems using IEC 62443-4-2
July 20, 2023
IEC 62443-4-2 host devices are independently evaluated and provide a secure-by-design open platform for industrial automation systems. Installing IIoT software and applications on these host devices creates an IIoT edge computing gateway that meets the industry’s gold standard for cybersecurity.
Technical approaches to defend and protect IoT nodes
January 18, 2023
Creating a secure IoT node begins with a “root of trust”, a small affordable integrated circuit designed to offer security-related services to the node. Examples are data encryption for preserving confidentiality and digital signatures to ensure authenticity and integrity of information.
Basis for an end-to-end security strategy
January 18, 2023
Managing assets as part of device and update management. Due to the development of automated tools for identifying resources and threats, industrial asset management plays a vital role in many industries where security operations are required. Asset management is not just crucial for software and IT companies.
Protecting industrial networks: zero chance for hackers
November 7, 2022
The downtime of a production plant can be expensive. Companies therefore want to protect themselves against hacker attacks. Jürgen Greger, Industrial Communication Product Manager at LAPP, gives insights into the topic and reveals how to make life difficult for attackers.
All-in-one Secure Routers Protect Critical Infrastructure
October 12, 2022
Moxa launches Industrial Intrusion Prevention Systems on its all-in-one secure routers to protect critical infrastructure.
Industrial Cybersecurity 2022 Special Report
September 15, 2022
In this special report, industry experts provide their perspective on trends and innovations in Industrial Cybersecurity. Security on the factory floor is the utmost priority, with IT pushing down new technology solutions to meet networking demands, new levels of IT/OT convergence and expanding IIoT requirements.