3 Zones that Require Network Security for Industrial Remote Access

By now, we have a good understanding of what secure remote access (SRA) is and why organizations might choose to enable it for their OT environments. We also know that securing IT-OT collaboration, leveraging guidance from best practice frameworks and … Continue reading 3 Zones that Require Network Security for Industrial Remote Access

Secure Remote Access: Why It’s Important and How to Do It Right

COVID-19 forced organizations all over the world to transition their employees to a work-from-home policy. That change came at a time when organizations’ connected infrastructure is more complex than ever. Such complexity doesn’t just exten… Continue reading Secure Remote Access: Why It’s Important and How to Do It Right

Final Version of NIST SP 1800-23 Guides Identification of Threats to OT Assets

In September 2019, the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) announced the release of a draft practice guide entitled, “NIST Special Publication (SP) 1800-23: Energy Secto… Continue reading Final Version of NIST SP 1800-23 Guides Identification of Threats to OT Assets

NIST SP 1800-23, Energy Sector Asset Management: Securing Industrial Control Systems

Industrial organizations face a growing list of digital threats these days. Back in April 2019, for instance, FireEye revealed that it had observed an additional intrusion by the threat group behind the destructive TRITON malware at another critical in… Continue reading NIST SP 1800-23, Energy Sector Asset Management: Securing Industrial Control Systems

The 4 Questions Industrial CISOs Need to Ask When Evaluating a Cybersecurity Tool

Cybersecurity is finally reaching the shop floor in earnest thanks to new technology that works with—not against—the legacy equipment that runs most industrial control systems (ICS). That being said, industrial companies and organizations i… Continue reading The 4 Questions Industrial CISOs Need to Ask When Evaluating a Cybersecurity Tool

ICS Security in a Nutshell: Common Challenges and How Tripwire Can Help Overcome Them

Industrial control systems (ICS) first proliferated at a time when cybersecurity didn’t weigh heavily on organizations’ minds. Since then, there have been two significant developments in the industry. First, cybersecurity has become a missi… Continue reading ICS Security in a Nutshell: Common Challenges and How Tripwire Can Help Overcome Them

How Plant Operators Can Overcome the Language Barrier to Securing OT Environments

Securing industrial operations is a unique challenge. The same approach used to secure information technology (IT) networks can’t effectively secure plant floors. That’s because operational technology (OT) has evolved tremendously over the … Continue reading How Plant Operators Can Overcome the Language Barrier to Securing OT Environments

3 Simple Steps to Securing Your ICS Systems against Digital Threats

We live in a world where connectivity is key. It’s brought conveniences to our personal lives, and organizations are adopting it into the industrial world to boost productivity. Industrial control systems (ICS), which manage utilities like water,… Continue reading 3 Simple Steps to Securing Your ICS Systems against Digital Threats