Cybersecurity

Securing industrial networks: There must be a better way!

February 2, 2021

Your industrial network can now help you deploy IoT/OT security at scale in a much easier and cost-effective way. Unique edge computing security architecture capabilities bring the simplicity and cost saving benefits industrial organizations are looking for when deploying OT security at scale.

Learn More

The path to a product with few vulnerabilities

February 2, 2021

To develop a product with few vulnerabilities, a process for a secure life cycle (Security Development Lifecycle) should be used. The IEC 62443-4-1 standard describes such a process for automation systems. This article presents that process consisting of eight elements for successful implementation.

Learn More

Your factory could be the next target for a cyber attack

February 2, 2021

The need for edge computing means more connected devices that interact with the real-world based on the data they receive. As computing power becomes pervasive, so does the need for security to address increased cyber risk. Only relying on firewalls is no longer effective with converged IT and OT networks.

Learn More

Industrial Control Systems: CIP Security and IEC 62443-4-2

December 4, 2020

CIP Security meets a significant number of IEC 62443-4-2 requirements and implements robust and ubiquitous security technologies to achieve protection of the control system device. These technologies can be part of an IEC 62443-4-2 security certification, and apply to the system level through IEC 62443-3-3.

Learn More

Securing network devices with the IEC 62443-4-2 standard

July 1, 2020

As devices are being constantly added to networks, device security is of paramount concern to asset owners. Complete system-level security must be built upon the foundations that consist of each individual component’s security functions, along with cybersecurity standards such as IEC 62443.

Learn More

Securing OT networks with unidirectional gateways/diodes

January 9, 2020

Data diodes offer a hardware-enforced solution to defend OT networks and safety systems, using one-way flow of data without allowing returning threats. As always, defensive strategies must still combine people, processes, and technology all working together to support OT network security.

Learn More

Industrial edge control security design and best practices

January 9, 2020

To address security’s complex, changing nature, system designers need to understand security risks and their environment, along with the security tools they have to work with. Security experts recognize several elements of system security including physical security, policies and procedures, and network security.

Learn More

IoT security system integrity, protection and verification

September 22, 2019

IoT security is an umbrella term that includes network, internet, endpoint, API, cloud, application, container security and more. It’s about establishing a set of security strategies that work together to help protect your digital data. Security is an ongoing process that includes continuous monitoring and a clear response plan.

Learn More

Cyber security in the oil and gas industry: preparation for risks

September 22, 2019

By following federal and industry standards and implementing a defense-in-depth approach to cybersecurity, hydrocarbon professionals in the oil and gas industry will be better prepared to prevent the financial, informational and physical risks that can result from a cyber-attack.

Learn More

Holistic cybersecurity for Industrial IoT applications

May 27, 2019

Industrial IoT (IIoT) offers the promise of business outcomes through the use of innovative technology. The challenge for industrial operations is to develop a balanced security stance to take advantage of IIoT innovation while maintaining the integrity of industrial security best practices.

Learn More