Industry Voices

This is a archive for Industry Voices.

New Approach to Secure Networks

By Katherine Brocklehurst
It’s not a surprise ensuring the reliability and availability of control systems is the number one
Read More.

ICS Security: Threats, Visibility, Convergence

By Heather MacKenzie
Do you believe your control system is in more danger from cyberattacks now than it was
Read More.

Defense in Depth: DNP3

By Heather MacKenzie
Two things that make ICS cybersecurity different from IT security are the use of industrial-specific protocols
Read More.

Interest in IoT Yields Interest in OT Security

By Paul Rogers
The more an organization wants to raise productivity, the more its individual parts need to connect
Read More.

How Firewalls Work

By Dr. Tobias Heer, Dr. Oliver Kleineberg and Jeff Lund
The Industrial Internet of Things (IIoT) takes operational performance
Read More.

ICS Security: Essential Firewall Concepts

By Jeff Lund
While there are benefits that have come to ICS and SCADA networks through the increased use
Read More.

Securing Physical Security

By Nate Kube
As we mentioned last month, physical security is now intersecting with cyber security in IT and
Read More.

Security and Transportation Systems

By Richard Weatherburn
Who hasn’t been frustrated when traffic comes to a standstill or underground transportation breaks down? Such
Read More.

Physical Security Meets OT

By Nate Kube
Several years ago, the key word used by security pundits was “convergence.” And, although different marketers
Read More.

Defining Deep Packet Inspection

By Erik Schweigert
Someone recently asked me the best way to describe Deep Packet Inspection (DPI) in laymen’s terms.
Read More.

 
 
Archived Entries