Cybersecurity
Reboot network security to enable digital transformation
May 30, 2021
Digital Transformation in manufacturing can deliver business value by improving operations and using innovative services. The greatest risk lies in the manufacturer’s ability to secure the production environment and the end-to-end connectivity between the plant and the cloud-based services and remote users.
Securely Managing Remote Operational Technology Networks
May 30, 2021
Experts in edge connectivity, industrial computing, and network infrastructure solutions offer advice on how to help leverage OT technology while minimizing cyber threats. With purpose-built and consolidated solutions, different players in the OT world are able to leverage the benefits of remote network management.
TAP vs SPAN: Overcoming Packet Visibility Challenges in OT Environments
May 30, 2021
The convergence of Operational Technology (OT) with Information Technology (IT) has exposed many challenges for the industrial space, including increased vulnerability to cyber-attacks and network blindspots.
Device level security for critical automation applications
May 30, 2021
Adding an extra layer of defense-in-depth security, particularly for motion applications, is an inexpensive way to make a facility a more hardened target that will discourage malicious actors in the first place and help to slow them down long enough to enable other defenses to expose and expel them from…
Cyber security strategies to secure the real world
May 30, 2021
Extending cyber security to the connected edge requires a strategy to effectively assess demands from each market and apply the right cyber security solutions to enable a secure device architecture congruent to the risk assessment within each application. A primary focus to address the industrial market is to develop solutions…
Securing industrial networks: There must be a better way!
February 2, 2021
Your industrial network can now help you deploy IoT/OT security at scale in a much easier and cost-effective way. Unique edge computing security architecture capabilities bring the simplicity and cost saving benefits industrial organizations are looking for when deploying OT security at scale.
The path to a product with few vulnerabilities
February 2, 2021
To develop a product with few vulnerabilities, a process for a secure life cycle (Security Development Lifecycle) should be used. The IEC 62443-4-1 standard describes such a process for automation systems. This article presents that process consisting of eight elements for successful implementation.
Your factory could be the next target for a cyber attack
February 2, 2021
The need for edge computing means more connected devices that interact with the real-world based on the data they receive. As computing power becomes pervasive, so does the need for security to address increased cyber risk. Only relying on firewalls is no longer effective with converged IT and OT networks.
Industrial Control Systems: CIP Security and IEC 62443-4-2
December 4, 2020
CIP Security meets a significant number of IEC 62443-4-2 requirements and implements robust and ubiquitous security technologies to achieve protection of the control system device. These technologies can be part of an IEC 62443-4-2 security certification, and apply to the system level through IEC 62443-3-3.
Securing network devices with the IEC 62443-4-2 standard
July 1, 2020
As devices are being constantly added to networks, device security is of paramount concern to asset owners. Complete system-level security must be built upon the foundations that consist of each individual component’s security functions, along with cybersecurity standards such as IEC 62443.