316749772 | Nathee Sanbooytho | Dreamstime

How to choose security for your OT operations

An effective OT security regimen must be able to secure the entire environment at a plant—the “legacy” machinery as well as the latest devices.
149817461 | Shutter2u | Dreamstime

Pair of new reports see glaring data, cybersecurity, content-sharing vulnerabilities

Surveys from Copia Automation and Kiteworks of manufacturing stakeholders join others, from Fortinet in June and Ponemon/Cyolo in February, that point to large, exploitable holes...
101777994 | Artiemedvedev | Dreamstime

Cybersecurity report shows threats to OT skyrocketing

Newly released survey from Fortinet says that nearly one-third of OT organizations reported more than six intrusions over the last year, up from 11% in 2023.
128766509 | Theerapong28 | Dreamstime

Manufacturing leads in cyberattacks for a third straight year, so what are some defenses?

An overwhelming majority of intrusions could have been mitigated with patching, multifactor authentication or least-privilege principles, an IBM study has found.
145690361 | Solarseven | Dreamstime

Protecting OT data under persistent threat from ransomware

These attacks not only threaten the security of sensitive information but also disrupt critical industrial operations, leading to significant financial losses and the damaging...
153537445 | Djbobus | Dreamstime

Navigating red-alert security challenges in manufacturing

Cyber threats have evolved into a formidable adversary, targeting the factory floor with relentless precision.
216979018 | Narongrit Sritana | Dreamstime

In reader survey, wide majority worries about OT vulnerabilities

Informal email poll of visitors to Smart Industry mirrors a February release of results from wider research that showed concern among over 1,000 security professionals about the...
259451736 | Olivier Le Moal | Dreamstime

Maximum security? How multifactor authentication is being defeated

Understanding the vulnerabilities of one of the hottest current security strategies against cyber intrusion.
182373079 | Josepalbert13 | Dreamstime

Air gapping OT assets may be the only sure way to shield critical infrastructure

These devices run very slim operating systems that often cannot accommodate onboard security measures. Moreover, many manufacturers have neglected security best practices.
190695476 | Pavel Kapysh | Dreamstime

Inside the Rockwell, Church & Dwight OT cybersecurity team-up

Officials from both companies and their new case study detail the history and contours of the industrial automation giant and consumer package goods maker’s cyber defense work...
130410047 | Funtap P | Dreamstime

Quiz: How vulnerable is your OT?

A recent survey of security professionals revealed an eye-opening result: That operational technology is widely vulnerable to intrusion. So, we at SI thought we'd quiz our audience...
105220373 | Etiamos | Dreamstime
IT/OT Convergence

Industrial OT widely vulnerable to intrusion, survey finds

Ponemon Institute polling of 1,056 security professionals in the U.S., Europe, Middle East, and Africa reveals that manufacturers generally lack the resources, expertise, and ...
188363662 | Josepalbert13 | Dreamstime

Cybersecurity: Topic A after Valentine’s Day

Two data security and regulatory experts check in with Smart Industry on Feb. 15 to chat about the threat landscape and more specifically fresh U.S. government regulations on ...
ID 142213526 © Motortion |

Podcast: Cybersecurity landscape and SEC rules for 2024

Smart Industry's Scott Achelpohl talks to IndustryWeek's Dennis Scimeca about the rising number of cyberattacks in manufacturing and the rules making them more visible.
107616028 | Michael Borgers | Dreamstime

Microsoft hack tests new SEC disclosure rules

The government regulations will be the subject of a Feb. 15 Smart Industry webinar featuring Michael Daniel, president and CEO of the Cyber Threat Alliance, and Richard Bird, ...