X

Ultra Electronics 3eTi

SCADA

Playing Zone Defense in Operational Technology

July 12th, 2017 / By

SCADA Security, Image of Dam, Text: Operational Technology: Playing Zone Defense

Industry is increasingly connecting operational technology (OT) networks to the internet, widening the attack surface, and heightening risk. By the year 2020, nearly 40 billion devices will be connected to the internet. More exposure requires more protection.


Categories: OT Security / Tags: , , , , , , , ,

OT Security Keeps Industrial Plants Safe from Cyber Threats

July 11th, 2017 / By

Image of conveyor belt with robotic arms under text(OT Security Keeps Industrial Plants Safe from Cyber Threats)

One of an industrial company’s top priorities will always be to protect its assets from threats. Industry news reports stories about cyber attacks daily. While the news tends to focus on IT system attacks, they are not the only systems at risk. As operational technology (OT) systems become more complex, they become more vulnerable. What can companies do to increase OT security?


Categories: OT Security / Tags: , , , , , , , , , , , , , ,

Cybersecurity Questions Answered:
What Is an Industrial Firewall?

May 31st, 2017 / By

Text: Cybersecurity questions answered: What is an Industrial Firewall? over blue abstract industrial landscape

An industrial firewall is a network firewall that has been hardened for use in industrial environments such as power plants, utility facilities, refineries, and the like. These hardware firewalls are purpose-built to work alongside SCADA (supervisory control and data acquisition) equipment in sometimes harsh surroundings.


Categories: Certifications and Validation, Industrial Control Systems / Tags: , , , , ,

How to Secure Industrial Control Systems for High Reliability and Robust Performance

September 15th, 2015 / By

I am always pleased to share operationally sound methods for deeply layering security, and I frequently demonstrate live hacks that illustrate how exploits can be countered undetectably to hackers once they’ve breached the firewall — as they inevitably will.


Categories: Industrial Control Systems / Tags: , , , , , , ,