Technologies

In the IoT Ecosystem, Not too long ago in history, the idea that people and objects could be inter-connected would be considered absurd. Since the invention of the internet, that absurdity has since morphed into possibilities. Today, not only are

The Industrial Internet of Things (IIoT) is made up of interconnected sensors, instruments and other devices networked together with ICS/SCADA systems controlling water utilities, transportation systems, electric grids (the power grid) and other critical infrastructure systems. The Industrial Internet of

Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last year. Here are four tips for making these systems safer. A large number of government agencies and private organizations have

Microsoft last week unveiled Trusted Cyber Physical Systems (TCPS), a new solution designed to help protect critical infrastructure against modern cyber threats. Microsoft provided the recent Triton and NotPetya attacks as examples of significant threats hitting critical infrastructure. Triton was

Kaspersky-OS

On a day by day basis do IOT (Internet of Things) and SCADA become more integrated in our lives. However, with the introductions of these new technologies, security issues have been evolving at an unprecedented rate. Little did manufactures of

Data diodes can create architectural complexity despite design simplicity of the data diodes themselves, but do they increase security? The concept of a data diode – a hardware device that only lets data out of the perimeter and prevents any

While there are many benefits that have come to ICS and SCADA networks through the increased use of standard networking and Internet technologies, it has made the need to secure them ever more critical. Firewalls play an important role in

Energy and electric utility organizations are facing a range of challenges requiring a reevaluation of the cyber security within their industrial control networks, endpoints and controllers. On the one hand, operators have to face losing access to phone lines, securing