Voices & Papers

This is a archive for Voices & Papers.

Malware-Infected ICS Thumb Drives Ship

By Eric Byres
Schneider Electric issued a security notification last month regarding their Communications and Battery Monitoring devices for
Read More.

IT, OT Joining Together for Security

By Sid Snitkin
There are plenty of industrial organizations that still view IT and OT cybersecurity as unique issues
Read More.

Magnifying Visibility in OT Environment

By Jason Maynard
Mid- to large-sized enterprises have, for many years, built the operational technology (OT) environment like an
Read More.

Secure by Design: Key to Smart Building

By Jalal Bouhdada
The very concept of a smart building is a tantalizing one for building owners and managers
Read More.

Know Your Vendor before a Partnership

By Anisha Damani
Industrial Internet of Things (IIoT) deployments are prone to breaches due to minimal security. This state of
Read More.

IIoT is Here, but Learn to Secure

By Patrick Grossetete
It’s a fact: Most people are worried about data breaches. While 42 percent of respondents appreciate
Read More.

Reliance Beyond Your System

By Robert Albach
What are the security boundaries of your systems? How much control do you really have? These
Read More.

Managing Risk and Protecting Reputation

By Heather MacKenzie and Mihaela Grad
Over the last ten years there has been a significant shift in the
Read More.

How to Improve a Manufacturer’s Security Posture

By Scot Wlodarczak
It is no secret Industry 4.0 offers great promise for manufacturers to optimize business operations. The
Read More.

Narrowing Down Potential Zero Days

By Robert Landavazo
It seems axiomatic that a Zero Day vulnerability is undefendable. At the moment a particular exploitable
Read More.

Archived Entries