Security CERT Global

Industrial Processes Move to the Cloud

Industrial Processes Move to the Cloud -Cloud-based software is gaining traction in the industrial world as companies realize benefits of […]

3 Keys to Securing Converged IT/OT Environments

3 Keys to Securing Converged IT/OT Environments -Securing the newly converged IT/OT environment requires a solid strategy https://www.industryweek.com/technology-and-iiot/article/21127438/3-keys-to-securing-converged-itot-environments ITOT, iiot, […]

ICS SCADA With Secure Clouds

ICS SCADA With Secure Clouds https://blog.paloaltonetworks.com/2018/03/pan-os-8-1-future-ics-scada-secure-clouds/ scada, cloudscada, IaaS, PaaS -the transition of ICS SCADA systems to a cloud-based implementation […]

Choosing the Right Pricing Model for Equipment as a Service

Choosing the Right Pricing Model for Equipment as a Service When sellers understand the value of equipment to a customer’s […]

Scalable, Current, Real-Time SCADA in the Cloud

Scalable, Current, Real-Time SCADA in the Cloud https://www.automationworld.com/products/control/blog/13317516/scalable-current-realtime-scada-in-the-cloud scada, cloudscada ‘…with cloud-based SCADA, you don’t have to set up a […]

Industrial network security best practice advice

Industrial network security best practice advice Four myths about networking and cybersecurity related to operations technology (OT) systems are highlighted […]

Data flow is no longer hierarchical

Data flow is no longer hierarchical Can industrial edge computing fit into the Purdue model? edgecomputing, iiot, SCADA, cloudscada, industrialautomation, […]

IT-OT collaboration needs context and increased visibility –

IT-OT collaboration needs context and increased visibility – Information technology (IT) and operational technology (OT) are continuing the process of […]

Trends for Industry 4.0 in 2020 and Beyond

Trends for Industry 4.0 in 2020 and Beyond – Greater flexibility, virtual validation, industrial controllers, and edge computing are some […]

ICSaaS – ICS as a cloud service is coming: Will the benefits outweigh the risks?

ICSaaS – ICS as a cloud service is coming: Will the benefits outweigh the risks? –Is plugging critical infrastructure into […]

Managing risk in today’s IoT landscape: not a one-and-done

Managing risk in today’s IoT landscape: not a one-and-done https://www.microsoft.com/security/blog/2020/04/28/managing-risk-todays-iot-landscape-not-one-and-done/ cybersecurity, iiot, scada, cloudscada, icssecurity -holistic approach to minimizing risk […]

Introduce analytics best practices into industrial environments

Introduce analytics best practices into industrial environments -Put analytics in the hands of the process experts who understand the data […]

A Cloud Based Alternative to Traditional SCADA

A Cloud Based Alternative to Traditional SCADA cybersecurity, iiot, scada, cloudscada, icssecurity -one of the benefits of leveraging the IIoT […]

SCADA: Alive and Well in the Age of IoT

SCADA: Alive and Well in the Age of IoT – Despite the onslaught of the Internet of Things within the […]

SCADA vulnerabilities in ICS architectures

SCADA vulnerabilities in ICS architectures infosec, cybersecurity. IIoT, ICSaaS, scada, cloudscada

Emerson Brings Cloud-Based SCADA Into Its Field

Emerson Brings Cloud-Based SCADA Into Its Field https://www.automationworld.com/products/control/news/13319994/emerson-brings-cloudbased-scada-into-its-field scada, cloudscada, IaaS, PaaS acquisition of Zedi’s software and automation businesses – […]

SEC Security Report September 2017

SEC Security Report September 2017: Editor Picks: News Intelligence Alerts Reports   WannaCry Post Mortem: Early Warning Indicators and Lessons Learned […]

SEC Automation: Choosing the Right Systems Integrator for your Automation Project

Choosing the Right Systems Integrator for your Automation Project – Industrial Control Systems: SCADA – Systems Integrators   Many automation system projects […]

SEC Vulnerabilities: Analysis of Exploitable Vulnerability Sequences in Industrial Networked Systems: A Proof of Concepts

  Software vulnerabilities can affect the security of any computer and industrial networked systems are no exception. Information about known […]

MGS+ ICS Security Report August 2017

MG Strategy+ ICS Security Report August 2017: Editor Picks: News Intelligence Alerts Reports   Financial malware more than twice as prevalent […]

MGS+ ICS Security Report June 2017

MGS+ ICS Security Report June 2017: Editor Picks: News Intelligence Alerts Report   Why Future Emphasis Should be on Algorithms – […]

MGS+ ICS Security Report May 2017

MGS+ ICS Security Report May 2017: Editor Picks: News Intelligence Alerts Report   ABB buys B&R to help it challenge Siemens […]

MGS+ ICS Security Report April 2017

MGS+ ICS Security Report April 2017: Editor Picks: News Intelligence Alerts Report   2017 Security 100: 20 Coolest Endpoint Security Vendors […]