Cybersecurity

’Chain of trust’ security solutions for IoT device identities

June 1, 2021

Eurotech is collaborating with Infineon Technologies, Microsoft and GlobalSign to develop a ’chain of trust’ security solution for IoT device identities. The companies are working together to deliver zero touch provisioning for IoT applications, and to simplify large scale, secure roll outs of connected devices.

Learn More

The first line of defence for industrial networks

June 1, 2021

Technology solutions are providing companies ways to eliminate network vulnerabilities and strengthen security, bridging the gap between OT and IT and sparking widespread interest in industry. Although the focus is often on external attacks, internal threats can be just as damaging to industrial networks.

Learn More

Reboot network security to enable digital transformation

May 30, 2021

Digital Transformation in manufacturing can deliver business value by improving operations and using innovative services. The greatest risk lies in the manufacturer’s ability to secure the production environment and the end-to-end connectivity between the plant and the cloud-based services and remote users.

Learn More

Securely Managing Remote Operational Technology Networks

May 30, 2021

Experts in edge connectivity, industrial computing, and network infrastructure solutions offer advice on how to help leverage OT technology while minimizing cyber threats. With purpose-built and consolidated solutions, different players in the OT world are able to leverage the benefits of remote network management.

Learn More

TAP vs SPAN: Overcoming Packet Visibility Challenges in OT Environments

May 30, 2021

The convergence of Operational Technology (OT) with Information Technology (IT) has exposed many challenges for the industrial space, including increased vulnerability to cyber-attacks and network blindspots.

Learn More

Device level security for critical automation applications

May 30, 2021

Adding an extra layer of defense-in-depth security, particularly for motion applications, is an inexpensive way to make a facility a more hardened target that will discourage malicious actors in the first place and help to slow them down long enough to enable other defenses to expose and expel them from…

Learn More

Cyber security strategies to secure the real world

May 30, 2021

Extending cyber security to the connected edge requires a strategy to effectively assess demands from each market and apply the right cyber security solutions to enable a secure device architecture congruent to the risk assessment within each application. A primary focus to address the industrial market is to develop solutions…

Learn More

Securing industrial networks: There must be a better way!

February 2, 2021

Your industrial network can now help you deploy IoT/OT security at scale in a much easier and cost-effective way. Unique edge computing security architecture capabilities bring the simplicity and cost saving benefits industrial organizations are looking for when deploying OT security at scale.

Learn More

The path to a product with few vulnerabilities

February 2, 2021

To develop a product with few vulnerabilities, a process for a secure life cycle (Security Development Lifecycle) should be used. The IEC 62443-4-1 standard describes such a process for automation systems. This article presents that process consisting of eight elements for successful implementation.

Learn More

Your factory could be the next target for a cyber attack

February 2, 2021

The need for edge computing means more connected devices that interact with the real-world based on the data they receive. As computing power becomes pervasive, so does the need for security to address increased cyber risk. Only relying on firewalls is no longer effective with converged IT and OT networks.

Learn More