OT
-
Connected Plant
Power in Unity: Strengthening OT Cybersecurity Through Collaboration
Cooperation across teams, technology, and institutions is the key to securing the world’s critical infrastructure. As the global industrial cybersecurity market grows toward a forecasted $41.4 billion in
Tagged in: -
Connected Plant
3 Major Cybersecurity Challenges Facing Critical Infrastructure and OT
Let’s be honest. Operational technology (OT) security issues are expected. Traditional OT systems were designed for specific functional—operational—purposes. Plus, they were designed to last for many decades. The power grid, the water supply, the manufacturing plant floor, these ubiquitous 24/7/365 operations fuel daily activities—and they power as much business as they do hospitals that care […]
-
Press Releases
OPSWAT Enhances its OT Security Solution with Improved Capabilities for Control and Visibility
OPSWAT has enhanced its MetaDefender OT Security solution, empowering organizations with enhanced visibility and control over their Operational Technology (OT) environments. In today’s increasingly complex industrial landscape, industrial and OT teams require complete asset visibility without disrupting OT networks and devices. MetaDefender OT Security addresses these challenges head-on, offering a purpose-built cybersecurity solution tailored to […]
Tagged in: -
Power
Why Utilities Need to Supercharge Their Approach to Cybersecurity
People know a storm can disrupt the electrical grid and cause a wave of complications across the region or country very quickly. But now, for those charged with grid reliability and keeping the lights on
-
Connected Plant
Energy Is the Most-Targeted Sector for Cyberattacks: Here’s What to Do
The energy sector recorded three times as many operational technology (OT) and/or industrial control system (ICS) cybersecurity incidents as the next closest vertical, according to a study conducted by the Cyentia Institute, a research and data science firm, and sponsored by Rockwell Automation, an industrial automation and information provider. “Energy, critical manufacturing, water treatment, and […]
-
Connected Plant
Four Ways to Protect the Energy Sector from Cybersecurity Threats
It’s been two years since the historic Colonial Pipeline ransomware attack shut down one of the largest and most vital oil pipelines in the U.S. While this hasn’t been the nation’s only attack on power infrastructure, it’s the largest publicly disclosed and, at $4.4 million, it was also the most-costly. Since then, we’ve learned that […]
Tagged in: -
Cybersecurity
Modernizing Cybersecurity Practices Within Utilities
The utility industry needs to be prepared to adapt at this time of uncertainty and change, rising prices, and international turmoil. However, it is becoming more challenging to comply with regulations and
Tagged in: -
Connected Plant
Zero Trust: Protecting Critical Infrastructure and Responding to CISA’s ‘Shields Up’
There are no boundaries in cyberspace. That fact has accelerated sharing of threat intelligence across the defenders, but it exponentially raises the threat of cyberattacks. This reality is underscored by the war in Ukraine, “the first major conflict involving large-scale cyber operations,” according to the U.S. Cybersecurity and Infrastructure Agency (CISA). A major concern is […]
-
IIOT
The Growth of Renewables Calls for Scalable Approaches to OT System and Device Integration
Reports from U.S. agencies indicate the use of renewable energy continues to grow. According to the U.S. Energy Information Administration, the U.S. consumed a record amount of renewable energy in 2020. In addition, renewable energy in the U.S. grew for a fifth consecutive year, accounting for 12% of the total U.S. energy consumption. It was […]
-
IIOT
Four Questions You Must Ace to Ensure Sound Cybersecurity in OT Systems
Some cybersecurity experts believe hackers today pose a greater threat than ever to power plants and electric grids. Much of the operational technology (OT) used in power stations and throughout the grid was installed at a time when cybersecurity was more of an afterthought than a focal point in the system design. Furthermore, the pool […]