Cybersecurity

Building security boundaries to enhance industrial cybersecurity

September 21, 2023

A defense-in-depth concept allows companies to leverage their existing network infrastructure and investment to build the first line of their network defense. Industrial intrusion prevention systems and security boundary concepts can also further protect OT systems from a wide range of cyberattacks.

Learn More

From data to defense: the evolving role of industrial network security

September 21, 2023

Converging networking and security in industrial operations can enhance visibility within the organization, improve threat prevention, detection and response, simplify management, provide scalability and flexibility, and offer a crucial platform for IT-OT collaboration that can be built upon.

Learn More

Can IoT development go hand in hand with cybersecurity?

September 21, 2023

Cybersecurity is not a tick-box exercise but a fundamental part of grid modernisation in smart utilities and in smart city development. It needs to be a continuous effort from the beginning and then carefully considered at each stage of the design.

Learn More

Operational technology security at a glance

September 21, 2023

Establishing a complete and effective OT security program is a complex endeavor that differs from typical cybersecurity strategies. Ultimately, the goal is to maximize uptime by enabling operators to take targeted action to reduce and, where possible, minimize security breaches in OT environments.

Learn More

Securing industrial automation systems using IEC 62443-4-2

July 20, 2023

IEC 62443-4-2 host devices are independently evaluated and provide a secure-by-design open platform for industrial automation systems. Installing IIoT software and applications on these host devices creates an IIoT edge computing gateway that meets the industry’s gold standard for cybersecurity.

Learn More

Technical approaches to defend and protect IoT nodes

January 18, 2023

Creating a secure IoT node begins with a “root of trust”, a small affordable integrated circuit designed to offer security-related services to the node. Examples are data encryption for preserving confidentiality and digital signatures to ensure authenticity and integrity of information.

Learn More

Basis for an end-to-end security strategy

January 18, 2023

Managing assets as part of device and update management. Due to the development of automated tools for identifying resources and threats, industrial asset management plays a vital role in many industries where security operations are required. Asset management is not just crucial for software and IT companies.

Learn More

Protecting industrial networks: zero chance for hackers

November 7, 2022

The downtime of a production plant can be expensive. Companies therefore want to protect themselves against hacker attacks. Jürgen Greger, Industrial Communication Product Manager at LAPP, gives insights into the topic and reveals how to make life difficult for attackers.

Learn More

All-in-one Secure Routers Protect Critical Infrastructure

October 12, 2022

Moxa launches Industrial Intrusion Prevention Systems on its all-in-one secure routers to protect critical infrastructure.

Learn More

Industrial Cybersecurity 2022 Special Report

September 15, 2022

In this special report, industry experts provide their perspective on trends and innovations in Industrial Cybersecurity. Security on the factory floor is the utmost priority, with IT pushing down new technology solutions to meet networking demands, new levels of IT/OT convergence and expanding IIoT requirements.

Learn More