Cybersecurity
’Chain of trust’ security solutions for IoT device identities
June 1, 2021
Eurotech is collaborating with Infineon Technologies, Microsoft and GlobalSign to develop a ’chain of trust’ security solution for IoT device identities. The companies are working together to deliver zero touch provisioning for IoT applications, and to simplify large scale, secure roll outs of connected devices.
The first line of defence for industrial networks
June 1, 2021
Technology solutions are providing companies ways to eliminate network vulnerabilities and strengthen security, bridging the gap between OT and IT and sparking widespread interest in industry. Although the focus is often on external attacks, internal threats can be just as damaging to industrial networks.
Reboot network security to enable digital transformation
May 30, 2021
Digital Transformation in manufacturing can deliver business value by improving operations and using innovative services. The greatest risk lies in the manufacturer’s ability to secure the production environment and the end-to-end connectivity between the plant and the cloud-based services and remote users.
Securely Managing Remote Operational Technology Networks
May 30, 2021
Experts in edge connectivity, industrial computing, and network infrastructure solutions offer advice on how to help leverage OT technology while minimizing cyber threats. With purpose-built and consolidated solutions, different players in the OT world are able to leverage the benefits of remote network management.
TAP vs SPAN: Overcoming Packet Visibility Challenges in OT Environments
May 30, 2021
The convergence of Operational Technology (OT) with Information Technology (IT) has exposed many challenges for the industrial space, including increased vulnerability to cyber-attacks and network blindspots.
Device level security for critical automation applications
May 30, 2021
Adding an extra layer of defense-in-depth security, particularly for motion applications, is an inexpensive way to make a facility a more hardened target that will discourage malicious actors in the first place and help to slow them down long enough to enable other defenses to expose and expel them from…
Cyber security strategies to secure the real world
May 30, 2021
Extending cyber security to the connected edge requires a strategy to effectively assess demands from each market and apply the right cyber security solutions to enable a secure device architecture congruent to the risk assessment within each application. A primary focus to address the industrial market is to develop solutions…
Securing industrial networks: There must be a better way!
February 2, 2021
Your industrial network can now help you deploy IoT/OT security at scale in a much easier and cost-effective way. Unique edge computing security architecture capabilities bring the simplicity and cost saving benefits industrial organizations are looking for when deploying OT security at scale.
The path to a product with few vulnerabilities
February 2, 2021
To develop a product with few vulnerabilities, a process for a secure life cycle (Security Development Lifecycle) should be used. The IEC 62443-4-1 standard describes such a process for automation systems. This article presents that process consisting of eight elements for successful implementation.
Your factory could be the next target for a cyber attack
February 2, 2021
The need for edge computing means more connected devices that interact with the real-world based on the data they receive. As computing power becomes pervasive, so does the need for security to address increased cyber risk. Only relying on firewalls is no longer effective with converged IT and OT networks.