Cybersecurity

Reboot network security to enable digital transformation

May 30, 2021

Digital Transformation in manufacturing can deliver business value by improving operations and using innovative services. The greatest risk lies in the manufacturer’s ability to secure the production environment and the end-to-end connectivity between the plant and the cloud-based services and remote users.

Learn More

Securely Managing Remote Operational Technology Networks

May 30, 2021

Experts in edge connectivity, industrial computing, and network infrastructure solutions offer advice on how to help leverage OT technology while minimizing cyber threats. With purpose-built and consolidated solutions, different players in the OT world are able to leverage the benefits of remote network management.

Learn More

TAP vs SPAN: Overcoming Packet Visibility Challenges in OT Environments

May 30, 2021

The convergence of Operational Technology (OT) with Information Technology (IT) has exposed many challenges for the industrial space, including increased vulnerability to cyber-attacks and network blindspots.

Learn More

Device level security for critical automation applications

May 30, 2021

Adding an extra layer of defense-in-depth security, particularly for motion applications, is an inexpensive way to make a facility a more hardened target that will discourage malicious actors in the first place and help to slow them down long enough to enable other defenses to expose and expel them from…

Learn More

Cyber security strategies to secure the real world

May 30, 2021

Extending cyber security to the connected edge requires a strategy to effectively assess demands from each market and apply the right cyber security solutions to enable a secure device architecture congruent to the risk assessment within each application. A primary focus to address the industrial market is to develop solutions…

Learn More

Securing industrial networks: There must be a better way!

February 2, 2021

Your industrial network can now help you deploy IoT/OT security at scale in a much easier and cost-effective way. Unique edge computing security architecture capabilities bring the simplicity and cost saving benefits industrial organizations are looking for when deploying OT security at scale.

Learn More

The path to a product with few vulnerabilities

February 2, 2021

To develop a product with few vulnerabilities, a process for a secure life cycle (Security Development Lifecycle) should be used. The IEC 62443-4-1 standard describes such a process for automation systems. This article presents that process consisting of eight elements for successful implementation.

Learn More

Your factory could be the next target for a cyber attack

February 2, 2021

The need for edge computing means more connected devices that interact with the real-world based on the data they receive. As computing power becomes pervasive, so does the need for security to address increased cyber risk. Only relying on firewalls is no longer effective with converged IT and OT networks.

Learn More

Industrial Control Systems: CIP Security and IEC 62443-4-2

December 4, 2020

CIP Security meets a significant number of IEC 62443-4-2 requirements and implements robust and ubiquitous security technologies to achieve protection of the control system device. These technologies can be part of an IEC 62443-4-2 security certification, and apply to the system level through IEC 62443-3-3.

Learn More

Securing network devices with the IEC 62443-4-2 standard

July 1, 2020

As devices are being constantly added to networks, device security is of paramount concern to asset owners. Complete system-level security must be built upon the foundations that consist of each individual component’s security functions, along with cybersecurity standards such as IEC 62443.

Learn More

Free Subscription

Receive email with each new issue of Industrial Ethernet, plus a weekly email digest of industry news, technology features and new products. Subscribe today!

Subscribe for Free