Introducing Cisco Rail CBTC and Safety Solution

Introducing Cisco Rail CBTC and Safety Solution

This is the last episode of this CBTC blog series. In the last three posts, I have shared some key trends and challenges metro operators are facing, the adoption of CBTC and its associated benefits and implementation challenges, as well as Cisco’s approach to delivering a simplified, secured, and resilient onboard and trackside network. For this post, let’s reveal the complete Cisco Rail CBTC and Safety Solution. Standard based, redundant, and modular architecture A Data…

Read More

Mitigating Lateral Movement with Zero Trust Access

Mitigating Lateral Movement with Zero Trust Access

Security service edge (SSE) technology was created to protect remote and branch users with a unified, cloud-delivered security stack. To understand how SSE solutions protect organizations and their users, it’s worthwhile to analyze attacker techniques, as well as the protections and controls SSE solutions use to disrupt them. It’s useful to use the MITRE ATT&CK framework. MITRE ATT&CK is a large knowledgebase of attacker techniques that cybersecurity experts use to describe the attack kill chains…

Read More

Using SD-WAN for securing distributed renewable energy

Using SD-WAN for securing distributed renewable energy

Renewable energy is a rapidly growing segment of the energy industry. Technologies such as wind, solar, biomass, geothermal, and energy storage are now considered mainstream. However, all of these sites require secure connectivity to enable important remote monitoring and control. Renewable energy companies must connect an array of renewable energy assets spread across wide geographic areas. Many renewable asset operators also use public and private cloud-based applications, including SCADA. They need a network architecture that…

Read More

NIS2 compliance for industrial networks: Are you ready?

NIS2 compliance for industrial networks: Are you ready?

Since the European Union (EU) signed the second version of the Network and Information Security (NIS2) Directive in December 2022, there has been a real frenzy all around Europe about it. NIS2 is now on top of the priority lists of most European Chief Information Security Officers (CISO). But do you know what it is? And most importantly, should you be concerned? You probably have no choice but to comply with NIS2 The short answer…

Read More

Cisco wins Manufacturing Solution of the Year award for integrating industrial security with networking

Cisco wins Manufacturing Solution of the Year award for integrating industrial security with networking

We are thrilled to announce that Cisco’s unified OT security and networking architecture is named “Smart Manufacturing Solution of the Year” in the 2024 IoT Breakthrough Awards. Industrial security can be a complex undertaking, and yet OT security is quintessential for modern Industrial IoT (IIoT) operations. IIoT systems generally contain a variety of interconnected systems and technologies, each with its own security needs. Some of these are older and not designed with modern security threats…

Read More

Secure your critical roadways infrastructure as you digitize and resolve congestion

Secure your critical roadways infrastructure as you digitize and resolve congestion

As a Londoner, it was slightly bitter-sweet to see London highlighted in the opening line of the INRIX Global Traffic Scorecard for 2022. Particularly as it is listed as the most congested city in the world. However, London isn’t alone, and congestion is clearly a global issue. Chicago and Paris are a close second and third on the list, with drivers in each city annually facing more than 130 lost hours in traffic due to…

Read More

Gain control over OT remote access with session monitoring, recording, and termination

Gain control over OT remote access with session monitoring, recording, and termination

Zero Trust Network Access (ZTNA) is a secure remote access service. It verifies remote users and grants them access to the right resources at the right times based on identity and context policies. This is part 3 in our blog series about ZTNA for operational technology (OT). Check out Part 1 for why ZTNA beats out always-on VPNs for OT remote access and Part 2 for how ZTNA reduces the attack surface by restricting access…

Read More

OT remote access: can you trust your technician’s laptop?

OT remote access: can you trust your technician’s laptop?

Zero Trust Network Access (ZTNA) is a secure remote access service that verifies remote users and grants access only to specific resources at specific times based on identity and context policies. This is part 2 in our ZTNA blog series for operational environments. Read the first blog here. Right now, somewhere in the world a robot arm needs a firmware upgrade, a wind turbine is stalled, and a highway message sign is displaying gibberish. If…

Read More

Evolve to Cloud-Enforced Security to Empower Your Anywhere Workforce

Evolve to Cloud-Enforced Security to Empower Your Anywhere Workforce

Part 4 of the six-part series – The 2023 Global Networking Trends Report series The next generation of enterprise architecture has arrived. Organizations are moving away from a complex patchwork of best-of-breed point solutions to a single-vendor strategy for a more consistent, secure networking platform that allows their distributed workforce to access hybrid cloud and multicloud applications more efficiently, reliably, and securely. In recent years, the software-defined WAN (SD-WAN) has been favored for its ability…

Read More