Articles

Yana Lysenko
dreamstime_m_324284666
Cybersecurity

How automated patching shields vulnerable manufacturing from cyberattacks

This process happens on schedule, according to rules set up by IT admins, freeing up IT personnel from the painstaking manual process while allowing patches to be rolled out quickly...
Gennady Kurinov | Dreamstime
dreamstime_m_72913465
Cybersecurity

Crucial role of cybersecurity protection for PLCs

Programmable logic controllers have become more interconnected and integrated into larger networks—and as a result they’ve become much more vulnerable to cyberattacks.
Ognyan Chobanov | Dreamstime
dreamstime_m_106882953
Cybersecurity

Reader poll: How do you protect your OT?

Curious minds want to know, so please tell us what your organization is doing to shield your vital production assets.
Emilyprofamily | Dreamstime
dreamstime_m_314986621
Cybersecurity

Optimizing your OT/IT cybersecurity strategy for an Industry 4.0 world

Are you prepared? Five tips manufacturers can follow to raise their defenses against production-crippling cyberattacks on their networks and systems.
316749772 | Nathee Sanbooytho | Dreamstime
Cybersecurity

How to choose security for your OT operations

An effective OT security regimen must be able to secure the entire environment at a plant—the “legacy” machinery as well as the latest devices.
149817461 | Shutter2u | Dreamstime
Cybersecurity

Pair of new reports see glaring data, cybersecurity, content-sharing vulnerabilities

Surveys from Copia Automation and Kiteworks of manufacturing stakeholders join others, from Fortinet in June and Ponemon/Cyolo in February, that point to large, exploitable holes...
101777994 | Artiemedvedev | Dreamstime
Cybersecurity

Cybersecurity report shows threats to OT skyrocketing

Newly released survey from Fortinet says that nearly one-third of OT organizations reported more than six intrusions over the last year, up from 11% in 2023.
128766509 | Theerapong28 | Dreamstime
Cybersecurity

Manufacturing leads in cyberattacks for a third straight year, so what are some defenses?

An overwhelming majority of intrusions could have been mitigated with patching, multifactor authentication or least-privilege principles, an IBM study has found.
145690361 | Solarseven | Dreamstime
Cybersecurity

Protecting OT data under persistent threat from ransomware

These attacks not only threaten the security of sensitive information but also disrupt critical industrial operations, leading to significant financial losses and the damaging...
153537445 | Djbobus | Dreamstime
Cybersecurity

Navigating red-alert security challenges in manufacturing

Cyber threats have evolved into a formidable adversary, targeting the factory floor with relentless precision.
216979018 | Narongrit Sritana | Dreamstime
Cybersecurity

In reader survey, wide majority worries about OT vulnerabilities

Informal email poll of visitors to Smart Industry mirrors a February release of results from wider research that showed concern among over 1,000 security professionals about the...
259451736 | Olivier Le Moal | Dreamstime
Cybersecurity

Maximum security? How multifactor authentication is being defeated

Understanding the vulnerabilities of one of the hottest current security strategies against cyber intrusion.
182373079 | Josepalbert13 | Dreamstime
Cybersecurity

Air gapping OT assets may be the only sure way to shield critical infrastructure

These devices run very slim operating systems that often cannot accommodate onboard security measures. Moreover, many manufacturers have neglected security best practices.
190695476 | Pavel Kapysh | Dreamstime
Cybersecurity

Inside the Rockwell, Church & Dwight OT cybersecurity team-up

Officials from both companies and their new case study detail the history and contours of the industrial automation giant and consumer package goods maker’s cyber defense work...
130410047 | Funtap P | Dreamstime
Cybersecurity

Quiz: How vulnerable is your OT?

A recent survey of security professionals revealed an eye-opening result: That operational technology is widely vulnerable to intrusion. So, we at SI thought we'd quiz our audience...