|

cybersecurity


Two Keys for Better Critical Infrastructure Cybersecurity

Two recent incidents have made the cost of not protecting our infrastructure and natural resources abundantly clear. First, there was the widely publicized SolarWinds attack that infected more than a…


Lessons For Keeping Smart Home Data Private

The utility industry has undergone a remarkable shift over the past 10 years. What was traditionally a one-way commodity electron-flow to customers has now become bidirectional traffic of both electrons…


5 Cybersecurity Best Practices to Protect Your OT Systems
cybersecurity

Over the last several years, cyber actors and online criminal gangs have used cyber warfare to disrupt business and infrastructure across the globe. Today, they are becoming even more aggressive…


The Airgap Is Not Enough: The Failed Security Perimeter Paradigm in OT Networks
cybersecurity

Operational technology (OT) electronics and networks for manufacturing, energy production, and virtually every other industrial application, are targets for cyberattacks. For infrastructure-related companies, such as power producers, transportation, and water…


How to Monitor Assets Remotely Today

As long as products have had ethernet ports, people have been asking for remote access to them. They believed they could just plug the devices into the internet, and it…