Articles

259451736 | Olivier Le Moal | Dreamstime
Cybersecurity

Maximum security? How multifactor authentication is being defeated

Understanding the vulnerabilities of one of the hottest current security strategies against cyber intrusion.
182373079 | Josepalbert13 | Dreamstime
Cybersecurity

Air gapping OT assets may be the only sure way to shield critical infrastructure

These devices run very slim operating systems that often cannot accommodate onboard security measures. Moreover, many manufacturers have neglected security best practices.
190695476 | Pavel Kapysh | Dreamstime
Cybersecurity

Inside the Rockwell, Church & Dwight OT cybersecurity team-up

Officials from both companies and their new case study detail the history and contours of the industrial automation giant and consumer package goods maker’s cyber defense work...
130410047 | Funtap P | Dreamstime
Cybersecurity

Quiz: How vulnerable is your OT?

A recent survey of security professionals revealed an eye-opening result: That operational technology is widely vulnerable to intrusion. So, we at SI thought we'd quiz our audience...
105220373 | Etiamos | Dreamstime
IT/OT Convergence

Industrial OT widely vulnerable to intrusion, survey finds

Ponemon Institute polling of 1,056 security professionals in the U.S., Europe, Middle East, and Africa reveals that manufacturers generally lack the resources, expertise, and ...
188363662 | Josepalbert13 | Dreamstime
Cybersecurity

Cybersecurity: Topic A after Valentine’s Day

Two data security and regulatory experts check in with Smart Industry on Feb. 15 to chat about the threat landscape and more specifically fresh U.S. government regulations on ...
ID 142213526 © Motortion | Dreamstime.com
Cybersecurity

Podcast: Cybersecurity landscape and SEC rules for 2024

Smart Industry's Scott Achelpohl talks to IndustryWeek's Dennis Scimeca about the rising number of cyberattacks in manufacturing and the rules making them more visible.
107616028 | Michael Borgers | Dreamstime
Cybersecurity

Microsoft hack tests new SEC disclosure rules

The government regulations will be the subject of a Feb. 15 Smart Industry webinar featuring Michael Daniel, president and CEO of the Cyber Threat Alliance, and Richard Bird, ...
165220673 | Josepalbert13 | Dreamstime
Special Reports

What’s in store in 2024 for cybersecurity, AI, and securely bridging the IT/OT gap

Desiree Lee, CTO for data at Armis, weighs in on what’s ahead for the top industrial data threats of the time as well as some of the security and asset intelligence opportunities...
295975744 | Zolak Zolak | Dreamstime
Industry News

AI adoption crawling among manufacturers, new report finds

Latest Sikich Industry Pulse results, from canvassing in August, also show weak buy-in for AI as relief for the U.S. manufacturing workforce deficit, with only 7% surveyed saying...
290117643 | Ai © Oleg Marushin | Dreamstime
Dreamstime M 290117643
Artificial Intelligence

Cybersecurity stakeholders praise AI executive order—but say it’s just a start

Industrial uses of artificial intelligence have a head start on any government attempts to protect its users, Smart Industry learned in interviews this week, but sources see the...
291615622 | Yuri Arcurs | Dreamstime
Dreamstime M 291615622
Cybersecurity

Robust cyber defenses depend on enough qualified staff to execute them

The inability to expand their workforce and lay a solid foundation for the future growth of their cybersecurity teams has continued to plague manufacturing companies.
276219509 | Maciek905 | Dreamstime
Dreamstime M 276219509
Industry News

Siemens debuts security testing suite for industrial networks

New all-in-one SINEC Security Inspector offers a single user interface that combines different cybersecurity tools and includes solutions for asset detection and identification...
59928510 | Monkey Business Images | Dreamstime
Dreamstime M 59928510
Industry Perspectives

Securing manufacturing operations: Why zero trust at the PLC level is critical

Too-broad “attack surfaces” mean industrial networked devices—single unsecured terminal or worker account—are vulnerable to bad cyber actors. How to manage and mitigate the risk...