Articles

Svetlana Diacenco
dreamstime_m_320591758
Cybersecurity

Crystal Ball preview: Top cybersecurity risks in 2025 and beyond

As we have seen with Boeing Co. and others, ransomware—online extortion schemes perpetrated against vulnerable companies—remains a top concern. And OT and the vast supply chain...
Leowolfert
dreamstime_m_95573365
Cybersecurity

Every cybersecurity program should include regulatory compliance

Assessing and repelling external threats to your production line can’t come at the expense of preventing damage from regulatory penalties that can be as costly or more so than...
Benzoix
dreamstime_m_314408650
Cybersecurity

Why communication is as vital as technical skills for manufacturing cybersecurity teams

The convergence of security and network operations is no longer a luxury—it’s an imperative—before the next wave of cyber threats, particularly AI-powered attacks.
Yana Lysenko
dreamstime_m_324284666
Cybersecurity

How automated patching shields vulnerable manufacturing from cyberattacks

This process happens on schedule, according to rules set up by IT admins, freeing up IT personnel from the painstaking manual process while allowing patches to be rolled out quickly...
Gennady Kurinov | Dreamstime
dreamstime_m_72913465
Cybersecurity

Crucial role of cybersecurity protection for PLCs

Programmable logic controllers have become more interconnected and integrated into larger networks—and as a result they’ve become much more vulnerable to cyberattacks.
Ognyan Chobanov | Dreamstime
dreamstime_m_106882953
Cybersecurity

Reader poll: How do you protect your OT?

Curious minds want to know, so please tell us what your organization is doing to shield your vital production assets.
Emilyprofamily | Dreamstime
dreamstime_m_314986621
Cybersecurity

Optimizing your OT/IT cybersecurity strategy for an Industry 4.0 world

Are you prepared? Five tips manufacturers can follow to raise their defenses against production-crippling cyberattacks on their networks and systems.
316749772 | Nathee Sanbooytho | Dreamstime
Cybersecurity

How to choose security for your OT operations

An effective OT security regimen must be able to secure the entire environment at a plant—the “legacy” machinery as well as the latest devices.
149817461 | Shutter2u | Dreamstime
Cybersecurity

Pair of new reports see glaring data, cybersecurity, content-sharing vulnerabilities

Surveys from Copia Automation and Kiteworks of manufacturing stakeholders join others, from Fortinet in June and Ponemon/Cyolo in February, that point to large, exploitable holes...
101777994 | Artiemedvedev | Dreamstime
Cybersecurity

Cybersecurity report shows threats to OT skyrocketing

Newly released survey from Fortinet says that nearly one-third of OT organizations reported more than six intrusions over the last year, up from 11% in 2023.
128766509 | Theerapong28 | Dreamstime
Cybersecurity

Manufacturing leads in cyberattacks for a third straight year, so what are some defenses?

An overwhelming majority of intrusions could have been mitigated with patching, multifactor authentication or least-privilege principles, an IBM study has found.
145690361 | Solarseven | Dreamstime
Cybersecurity

Protecting OT data under persistent threat from ransomware

These attacks not only threaten the security of sensitive information but also disrupt critical industrial operations, leading to significant financial losses and the damaging...
153537445 | Djbobus | Dreamstime
Cybersecurity

Navigating red-alert security challenges in manufacturing

Cyber threats have evolved into a formidable adversary, targeting the factory floor with relentless precision.
216979018 | Narongrit Sritana | Dreamstime
Cybersecurity

In reader survey, wide majority worries about OT vulnerabilities

Informal email poll of visitors to Smart Industry mirrors a February release of results from wider research that showed concern among over 1,000 security professionals about the...
259451736 | Olivier Le Moal | Dreamstime
Cybersecurity

Maximum security? How multifactor authentication is being defeated

Understanding the vulnerabilities of one of the hottest current security strategies against cyber intrusion.