Cisco and Rockwell strengthen OT/ICS security with visibility for converged plantwide ethernet (CPwE)

Cisco and Rockwell strengthen OT/ICS security with visibility for converged plantwide ethernet (CPwE)

The turtle, protected by its hard shell, is a good metaphor for the security model used in most industrial networks. The industrial DMZ (iDMZ) is the shell that protects the soft, vulnerable center—the industrial control systems (ICS) the business depends on. But while the iDMZ blocks most threats, some will inevitably slip through. When they do, they can move sideways from device to device, potentially causing downtime and information leakage. Giving traffic free rein once…

Read More

Is it time to virtualize your factory floor?

Is it time to virtualize your factory floor?

Co-authored by Roland Wagner, CODESYS. Virtualization is well accepted in enterprise IT. Creating virtual versions of computing resources such as servers and storage, enables the consolidation of multiple physical resources into a single virtual environment. This allows for more efficient utilization of hardware and better resource management.  The value derived includes reduced capital expenditures, lower maintenance costs, increase flexibility and improved cybersecurity. However, virtualization is not so prevalent in industrial environments. Industrial Automation and Control…

Read More

Manufacturing safety: Effective planning & communication in emergencies

Manufacturing safety: Effective planning & communication in emergencies

Manufacturing safety: Effective planning & communication in emergencies | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

How to protect an enterprise’s intellectual property

How to protect an enterprise’s intellectual property

How to protect an enterprise’s intellectual property | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

US enterprises hit hard by short-staffed security operations centers

US enterprises hit hard by short-staffed security operations centers

US enterprises hit hard by short-staffed security operations centers | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Employee investigations resolved faster with interview technology

Employee investigations resolved faster with interview technology

Employee investigations resolved faster with interview technology | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

A case for market-driven cybersecurity in critical infrastructure

A case for market-driven cybersecurity in critical infrastructure

A case for market-driven cybersecurity in critical infrastructure | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

USB cyberattacks pose a threat to manufacturing & industrial sector

USB cyberattacks pose a threat to manufacturing & industrial sector

USB cyberattacks pose a threat to manufacturing & industrial sector | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Check out Episode 8 of The Cybersecurity and Geopolitical Podcast — China’s Role in Cybersecurity: Opportunity, Manufacturer or Threat?

Check out Episode 8 of The Cybersecurity and Geopolitical Podcast — China’s Role in Cybersecurity: Opportunity, Manufacturer or Threat?

Check out Episode 8 of The Cybersecurity and Geopolitical Podcast — China’s Role in Cybersecurity: Opportunity, Manufacturer or Threat? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our…

Read More

Supply chain security must include cyber resilience

Supply chain security must include cyber resilience

Supply chain security must include cyber resilience This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More
1 2 3 4