Security CERT Global

Industrial network security best practice advice

Industrial network security best practice advice Four myths about networking and cybersecurity related to operations technology (OT) systems are highlighted […]

Data flow is no longer hierarchical

Data flow is no longer hierarchical Can industrial edge computing fit into the Purdue model? edgecomputing, iiot, SCADA, cloudscada, industrialautomation, […]

IT-OT collaboration needs context and increased visibility –

IT-OT collaboration needs context and increased visibility – Information technology (IT) and operational technology (OT) are continuing the process of […]

Trends for Industry 4.0 in 2020 and Beyond

Trends for Industry 4.0 in 2020 and Beyond – Greater flexibility, virtual validation, industrial controllers, and edge computing are some […]

The IoT Really Does Work in the Factory

The IoT Really Does Work in the Factory – Industrial IoT pays off big in terms of reduced maintenance and […]

ICSaaS – ICS as a cloud service is coming: Will the benefits outweigh the risks?

ICSaaS – ICS as a cloud service is coming: Will the benefits outweigh the risks? –Is plugging critical infrastructure into […]

Managing risk in today’s IoT landscape: not a one-and-done

Managing risk in today’s IoT landscape: not a one-and-done https://www.microsoft.com/security/blog/2020/04/28/managing-risk-todays-iot-landscape-not-one-and-done/ cybersecurity, iiot, scada, cloudscada, icssecurity -holistic approach to minimizing risk […]

Introduce analytics best practices into industrial environments

Introduce analytics best practices into industrial environments -Put analytics in the hands of the process experts who understand the data […]

A Cloud Based Alternative to Traditional SCADA

A Cloud Based Alternative to Traditional SCADA cybersecurity, iiot, scada, cloudscada, icssecurity -one of the benefits of leveraging the IIoT […]

SCADA: Alive and Well in the Age of IoT

SCADA: Alive and Well in the Age of IoT – Despite the onslaught of the Internet of Things within the […]

SEC Security Report September 2017

SEC Security Report September 2017: Editor Picks: News Intelligence Alerts Reports   WannaCry Post Mortem: Early Warning Indicators and Lessons Learned […]

SEC Vulnerabilities: Analysis of Exploitable Vulnerability Sequences in Industrial Networked Systems: A Proof of Concepts

  Software vulnerabilities can affect the security of any computer and industrial networked systems are no exception. Information about known […]

MGS+ ICS Security Report July 2017

MG Strategy+ ICS Security Report July 2017: Editor Picks: News Intelligence Alerts Reports   Power plant cyber threat: Lock up your […]

MGS+ ICS Security Report March 2017

MGS+ ICS Security Report March 2017: Editor Picks: News Intelligence Alerts Reports   World’s Biggest Data Breaches Selected losses greater than […]