EDITORIAL TOPICS
Take an in depth look at our editorial topics. In each accordion we you will find a detailed overview of the types of content we are looking for.
A listing of the industrial vulnerabilities for the week, including additions to CISA’s Known Exploited Vulnerabilities Catalog.
A cybersecurity strategy takes on many shapes and forms depending on the company. While each plan is unique, many share certain universal truths.
We sit down with an expert in the industrial cybersecurity field, content partner or CEO to discuss trends in the field and how to create more secure systems.
We discuss major industrial cybersecurity topics and feature industry experts covering everything from ransomware to critical infrastructure to supply chain attacks. Hosted by Gary Cohen and Tyler Wall.
The Industrial Internet of Things (IIoT) and cloud connect systems in different departments can improve communication, but they also increase cybersecurity risk.
Each month, we will send out a list of questions to experts in the field on related industrial cybersecurity topics. Their responses will be broken into four separate articles, and one will be released on Wednesdays.
Information technology (IT) and operational technology (OT) used to be separate departments in manufacturing. The IIoT and Industry 4.0 have changed that along with expectations.
For Throwback Thursdays, we will look back at an industrial cybersecurity attack from the past and its impact on the field. Week to week, we’ll cover attacks from Stuxnet to SolarWinds and everything in between.
A grouping of our best articles from the week, along with information on the new vulnerabilities on the cyber scene.
There are many potential cybersecurity threats out there. How can you plan or prepare for them and know what to look for in your facility?
We sit down with an expert in the industrial cybersecurity field, content partner or CEO to discuss trends in the field and how to create more secure systems.
There are many types of industrial networks that can help manufacturers be safe, but the type depends on the facility and the restrictions/codes that need to be followed. What applies to a process facility doesn’t necessarily apply to a discrete facility.
Take an in depth look at our editorial topics. In each accordion we you will find a detailed overview of the types of content we are looking for.
Until recently, IT and OT were siloed off and only saw each other in the halls or at the company holiday party. That’s no longer true. Because of the IIoT and other technology advances, they have to work together. Problem: They have different goals and agendas and different ways of working. How can management help bridge the divide?
Cybersecurity is not optional in industrial manufacturing facilities anymore; it’s the norm. What strategies or methods can engineers use to make the process a consistent one so there aren’t lapses?
Industrial cybersecurity is an ever-changing industry. As attacks from malicious actors mount, from SolarWinds to Verkada, it’s becoming increasingly important that professionals stay current so they can meet the threat head-on.
No industrial facility is alike and neither is the industrial network. Whether it’s a traditional network, a hybrid or something else altogether, the network needs to fit the company’s goals and plans.
Each industrial manufacturing facility is unique, but there are some universal truths each one can follow to at least create a baseline for cybersecurity. After that, what can manufacturers do to help keep their facilities cybersecure? When to upgrade an aging device on your network
Cybersecurity compliance can be complicated. Just keeping track of the various acronyms and controls is a full-time job, and requirements vary depending on the industry and governing body. But it’s essential to meet the various controls to protect the integrity of businesses and information.
The IIoT and cloud have changed manufacturing from what it was even 10 years ago. While these concepts can open manufacturing facilities to cyberattack, it’s a double-edged sword. How can they help improve manufacturing cybersecurity rather
than hinder it?
The incidence of cyberattacks faced by industrial manufacturing companies is 30 times larger than it was in 2012. For technology companies, it has risen by a factor of 20. How can companies protect themselves against this rising
threat?