operational technology
-
Connected Plant
Power in Unity: Strengthening OT Cybersecurity Through Collaboration
Cooperation across teams, technology, and institutions is the key to securing the world’s critical infrastructure. As the global industrial cybersecurity market grows toward a forecasted $41.4 billion in
Tagged in: -
Power
Why Utilities Need to Supercharge Their Approach to Cybersecurity
People know a storm can disrupt the electrical grid and cause a wave of complications across the region or country very quickly. But now, for those charged with grid reliability and keeping the lights on
-
IIOT
The Growth of Renewables Calls for Scalable Approaches to OT System and Device Integration
Reports from U.S. agencies indicate the use of renewable energy continues to grow. According to the U.S. Energy Information Administration, the U.S. consumed a record amount of renewable energy in 2020. In addition, renewable energy in the U.S. grew for a fifth consecutive year, accounting for 12% of the total U.S. energy consumption. It was […]
-
IIOT
Four Questions You Must Ace to Ensure Sound Cybersecurity in OT Systems
Some cybersecurity experts believe hackers today pose a greater threat than ever to power plants and electric grids. Much of the operational technology (OT) used in power stations and throughout the grid was installed at a time when cybersecurity was more of an afterthought than a focal point in the system design. Furthermore, the pool […]
-
Connected Plant
5 Cybersecurity Best Practices to Protect Your OT Systems
Over the last several years, cyber actors and online criminal gangs have used cyber warfare to disrupt business and infrastructure across the globe. Today, they are becoming even more aggressive and are using their resources to target Operations Technology (OT) and Industrial Control System (ICS) networks. According to the Canadian government’s Canadian Centre for Cyber […]
Tagged in: -
Technology
Digital Transformation: Lessons from a Leader
Is your company’s information technology (IT) department your friend or your enemy? Does it work with you to identify, evaluate, and select the best new digital technology to make your job easier and your
-
IIOT Power
General Best Cybersecurity Practices to Thwart a Dragonfly Attack
A report released by the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) outlines a number of solutions and general best practices to thwart infiltration by the ongoing Dragonfly cyberattack campaign, which it says is targeting operational technology personnel. (For an in-depth story on that report, see: “DHS, FBI Identify Tactics in Cyberattack […]
-
IIOT Power
DHS, FBI Identify Tactics in Cyberattack Campaign Targeting Industrial Control Systems
The Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) warned in an e-mail on October 20 that an ongoing cyberattack campaign is targeting the nuclear, energy, and other critical infrastructure sectors since at least May 2017—with results ranging from cyber espionage to the ability to disrupt energy systems in the event of […]