Cybersecurity
Securing industrial networks: There must be a better way!
February 2, 2021
Your industrial network can now help you deploy IoT/OT security at scale in a much easier and cost-effective way. Unique edge computing security architecture capabilities bring the simplicity and cost saving benefits industrial organizations are looking for when deploying OT security at scale.
The path to a product with few vulnerabilities
February 2, 2021
To develop a product with few vulnerabilities, a process for a secure life cycle (Security Development Lifecycle) should be used. The IEC 62443-4-1 standard describes such a process for automation systems. This article presents that process consisting of eight elements for successful implementation.
Your factory could be the next target for a cyber attack
February 2, 2021
The need for edge computing means more connected devices that interact with the real-world based on the data they receive. As computing power becomes pervasive, so does the need for security to address increased cyber risk. Only relying on firewalls is no longer effective with converged IT and OT networks.
Industrial Control Systems: CIP Security and IEC 62443-4-2
December 4, 2020
CIP Security meets a significant number of IEC 62443-4-2 requirements and implements robust and ubiquitous security technologies to achieve protection of the control system device. These technologies can be part of an IEC 62443-4-2 security certification, and apply to the system level through IEC 62443-3-3.
Securing network devices with the IEC 62443-4-2 standard
July 1, 2020
As devices are being constantly added to networks, device security is of paramount concern to asset owners. Complete system-level security must be built upon the foundations that consist of each individual component’s security functions, along with cybersecurity standards such as IEC 62443.
Securing OT networks with unidirectional gateways/diodes
January 9, 2020
Data diodes offer a hardware-enforced solution to defend OT networks and safety systems, using one-way flow of data without allowing returning threats. As always, defensive strategies must still combine people, processes, and technology all working together to support OT network security.
Industrial edge control security design and best practices
January 9, 2020
To address security’s complex, changing nature, system designers need to understand security risks and their environment, along with the security tools they have to work with. Security experts recognize several elements of system security including physical security, policies and procedures, and network security.
IoT security system integrity, protection and verification
September 22, 2019
IoT security is an umbrella term that includes network, internet, endpoint, API, cloud, application, container security and more. It’s about establishing a set of security strategies that work together to help protect your digital data. Security is an ongoing process that includes continuous monitoring and a clear response plan.
Cyber security in the oil and gas industry: preparation for risks
September 22, 2019
By following federal and industry standards and implementing a defense-in-depth approach to cybersecurity, hydrocarbon professionals in the oil and gas industry will be better prepared to prevent the financial, informational and physical risks that can result from a cyber-attack.
Holistic cybersecurity for Industrial IoT applications
May 27, 2019
Industrial IoT (IIoT) offers the promise of business outcomes through the use of innovative technology. The challenge for industrial operations is to develop a balanced security stance to take advantage of IIoT innovation while maintaining the integrity of industrial security best practices.