IoT and IIOT Cybersecurity Market Map

@tachyeonz : CB Insights has identified 78 private companies at the intersection of cybersecurity and connected hardware, which includes: critical infrastructure, mobile phones, connected devices, enterprise endpoints, and connected cars.

Read More

Connect On:
Twitter :@tachyeonz

Researchers Create Undetectable Rootkit That Targets Industrial Equipment

@tachyeonz : Two researchers presenting at the Black Hat Europe security conference in London revealed a method of infecting industrial equipment with an undetectable rootkit component that can wreak havoc and disrupt the normal operations of critical infrastructure all over the world.

Read More

Connect On:
Twitter :@tachyeonz

Wetwear for Wires

@tachyeonz : The Mr. Robot television series has some real world imitators18 Sep What would Dave and Bill do? Probably not this15 Sep

More

Tags : analytics, artificial intelligence, cyber security, data science, ics, iiot, infosec, iot, machine learning, z

Published On:January 01, 2017 at 10:07AM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

SCADA Security: Securing DNP3 Communications with Defense in Depth

@tachyeonz : Two things that make ICS cybersecurity different from IT security are the use of industrial-specific protocols like DNP3 and the common usage of endpoints like PLCs, IEDs and RTUs that are 15+ years old.

More

Tags : control systems, cyber security, cybersecurity, cyberwarfare, cyberweapons, dnp3, exploit, hack, ics, ics tools, iec 61850, infosec, malawares, pentesting, plc, rtu, scada, smart grids, substations, virus, vulnerability, z

Published On:June 16, 2016 at 10:03PM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

VW to hire 1,000 IT experts over 3 years

@tachyeonz : Volkswagen said it will hire more than 1,000 additional IT experts in the next three years, as Europe’s largest car group aims to bolster its expertise in digital technologies.

More

Tags : control systems, digital manufacturing, hiring, ics, iiot, industrial automation, industrial internet, industrial iot, industrial revolution, industrie 4.0, industry 4.0, m, robotics, smart factory, system integrators, volkswagen

Published On:December 30, 2016 at 06:37PM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

Trends in Industrial Automation Connectivity

@tachyeonz : Trends in industrial automation connectivity. Dave Sutton Product Marketing Manager at Schneider Electric.

More

Tags : asset management, connectivity, ics, iiot, industrial automation, industrial internet, industry 4.0, internet of things, interoperability, iot, m, manufacturing 4.0, opc ua, standards, trends, videos

Published On:June 06, 2016 at 08:32PM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

How Can We Make Automation Architectures fit Industry?

@tachyeonz : From the inception of the digital technology revolution, automation system architectures have been defined based on the constraints imposed by hardware, software, networking, power and cost imposed by the available technologies.

Click here to read more

Tags : analytics, data science, ics, iiot, industrial automation, industrial internet, m

Published On:August 17, 2016 at 10:11PM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

Examining the Vulnerabilities of Industrial Automation Control System

@tachyeonz : This insight paper depicts the real incident of a cyber-attack on a Ukrainian energy distribution company, Ukrainian Kyivoblenergo, to demonstrate how vulnerable Industrial Automation Control System (IACS) are without a clearly defined Supervisory Control and Data Acquisition (SCADA) cyber security

Click here to read more

Tags : analytics, cyber security, ics, iiot, industrial internet, infosec, iot, m

Published On:August 16, 2016 at 10:42PM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

ForeScout simplifies IoT security

@tachyeonz : Smart lighting, smart meters, smart building systems and other smart endpoints. It seems every device today is a “smart” device. The level of intelligence for the various devices can vary greatly.

Click here to read more

Tags : cyber security, ics, iiot, infosec, iot, m

Published On:August 13, 2016 at 05:31AM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

ICS-CERT report finds more than 600 IT security weaknesses in US critical infrastructure

@tachyeonz : The trend for connecting critical infrastructure to the internet has led to more than 600 IT security weaknesses being found in industrial control systems (ICS) in critical infrastructure in the US.

Click here to read more

Tags : critical infrastructure, cyber security, hacking, ics, iiot, infosec, iot, m

Published On:August 11, 2016 at 11:06PM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

Don’t Forget: PKI Is A Necessary Element of Securing OPC UA

@tachyeonz : The ICS community has this regrettable tendency of bringing in new IT and security technologies without the knowledge or commitment of resources to properly use the technology. Active Directory with no trained Domain Admins. Cisco infrastructure without even basic CCNA skills.

Click here to read more

Tags : cyber security, hacking, ics, iiot, m, opc ua, pki

Published On:November 28, 2016 at 08:46AM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz

IoT and IIOT Cybersecurity Market Map

@tachyeonz : CB Insights has identified 78 private companies at the intersection of cybersecurity and connected hardware, which includes: critical infrastructure, mobile phones, connected devices, enterprise endpoints, and connected cars.

Click here to read more

Tags : #antivirus, #cybersecurity, #firewall, #hacking, #ics, #iiot, #industrialautomation, #industrialinternet, #iot, #landscape, #malawares, #scada, #vunerability, m

Published On:December 09, 2016 at 03:50AM

Connect On:
Facebook : /tachyeonz
Twitter :@tachyeonz