Articles & News on Network Management & Protection

HMF Leads Research Project on Protecting 5G Campus Networks From Cyber Attacks

  • October 20, 2023
  • News

How can 5G campus networks be better protected against cyber attacks and unforeseen incidents? This is the question HMF Smart Solutions, as consortium leader, is investigating together with four partners.

Radiflow Partners with Cyolo to Secure OT Networks Against Unauthorized Device Access

  • October 17, 2023
  • News

“Having a central point of entry allows us to better understand OT network activity,” said Ilan Barda, co-founder and CEO of Radiflow.

Automate Security Patch Management to Reduce Vulnerabilities

  • by Zac Amos
  • October 13, 2023
  • Feature

Automated patch management results in faster fixes, fewer errors and higher IT productivity. While they cannot stop everything, automated patch management tools are crucial to improving your business’s security.

Case Study: Zero Trust Is a Requirement for Connected Oil and Gas Workers

  • by Larry O'Brien
  • October 9, 2023
  • Case Study

With the adoption of a digitalization strategy, PETRONAS has found that cybersecurity must be approached from a more holistic perspective.

Moxa Achieves World's First IEC 62443-4-2 Certification for Industrial Secure Routers

  • October 3, 2023
  • News

This coveted certification was awarded to Moxa's flagship industrial secure routers, the EDR-G9010 and TN-4900 Series.

Cyolo, KuppingerCole Unveil Key Insights into OT Cybersecurity Threat Landscape

  • September 26, 2023
  • News

Cyolo elevates OT security with release of Cyolo 4.3 and KuppingerCole report on OT cybersecurity landscape, key architectures and functionalities, and regulatory compliance.  

Skkynet Reports Strong Sales Growth and Robust Profitability in Third Quarter

  • September 20, 2023
  • News

Skkynet has announced fiscal quarter-end performance for Q3 2023, delivering exceptional sales growth of 19%.

How to Proactively Protect Your Industrial Networks

  • by Roger Chen
  • January 11, 2023
  • Feature

Increased cybersecurity incidents have been crippling critical infrastructure and harming businesses. Here's how to respond.

Powering Next-gen Servos with the Right Network Technology

  • by Tom Burke
  • January 11, 2023
  • Feature

Tom Burke, Global Strategic Advisor at CLPA, looks at the enabling solutions that are driving servo performance.

Top 25 ICS Vulnerabilities

  • by Henry Martel
  • November 11, 2022
  • Feature

Weaponized cybersecurity attacks can destroy critical infrastructure systems that support daily life. This feature originally appeared in the Automation 2022 Volume 4: Cybersecurity & Connectivity Ebook.

Common Cyberattacks and the Tactics Behind Them

  • by Dave Kostos
  • March 19, 2024
  • Feature

​A clear understanding of common cyberattacks and the tactics behind them is paramount for today’s businesses.

Implement Automated Threat Intelligence for Improved Incident Response

  • by Zac Amos
  • March 11, 2024
  • Feature

Cybercrime is always changing. While staying on top of shifts can be tricky, automated threat intelligence makes it easier.

As OT Threats Proliferate, Zero Trust Is the Foundation of a Cyber Resilient Organization

  • by Qiang Huang
  • February 12, 2024
  • Feature

Zero Trust Architecture significantly enhances the cyber resilience of Operational Technology organizations by adopting a holistic approach across preparation, response, recovery and supporting uptime and safety.

ORing's Industrial Ethernet Switch Passes ISO 14067 Carbon Footprint Verification

  • February 7, 2024
  • News

ORing announced that the carbon footprint declaration for its IGPS-9084GP-LA industrial-grade Ethernet switch has been verified to comply with ISO 14067.

Software-Driven Evolution in the Industrial Network Infrastructure Market

  • by Chantal Polsonetti
  • December 11, 2023
  • Feature

This report, the first of several drawn from ARC’s recent Industrial Ethernet Switch market update, highlights new and ongoing software-driven developments in the IES landscape.

Build Reliable Oil and Gas Infrastructure with Future-proof Networking Solutions

  • by Alvis Chen
  • December 6, 2023
  • Feature

Rugged networking devices combined with simplified management software are indispensable in strengthening competitiveness.

Managing Network Security

  • by Charlie Norz
  • October 26, 2023
  • Feature

Which Ethernet switch do you use? That can be very important when it comes to cybersecurity. This feature originally appeared in the AUTOMATION 2023: Cybersecurity & Connectivity ebook published in September.

Leverage Automation to Empower Zero Trust

  • by Zac Amos
  • October 26, 2023
  • Feature

The zero-trust network access (ZTNA) model has been a game-changer for several organizations. It can become even better with the power of artificial intelligence.

Easy Realization of Open VPN

  • by Barry Turner
  • October 24, 2023
  • Feature

Using an edge controller as your OpenVPN solution can provide a reliable solution that addresses both plant floor and remote location network connectivity requirements.

Empower Industrial Networks to Drive OT/ICS Cybersecurity

  • by Andrew McPhee
  • October 23, 2023
  • Feature

Gain visibility at scale and enforce ISA/IEC62443 zones and conduits to find and contain threats. This feature originally appeared in the AUTOMATION 2023: Cybersecurity & Connectivity ebook published in September.

Implementing Planned Security Technology

  • by Brock Josephson
  • May 10, 2022
  • Feature

As new security risks emerge and technologies improve, more sophisticated electronic security measures become necessary. This feature originally appeared in Automation 2022: Cybersecurity & Connectivity Volume 2.

Telenor, Aker and Cognite Establish Software Security Company

  • May 3, 2022
  • News

Aker, Cognite and Telenor are establishing a software security company to serve industry and operational technology.

Trying to Secure Critical infrastructure? You Can’t Take Your Foot Off the Gas.

  • by Rick Peters
  • December 8, 2021
  • Feature

Now that bad actors have witnessed the impact an attack can have on critical infrastructure OT systems, they’re emboldened to try and expand cyber campaigns to illustrate supremacy and increase public distrust and anxiety. So, we’ll dive into some of the most significant concerns that OT leaders need to be aware of in the coming year–and what can be done to strengthen your security posture.

Wibu-Systems Opens its Stockholm Office to Serve the Scandi-Baltic Region

  • October 18, 2021
  • News

Wibu-Systems, Germany’s leading advocates for digital protection, licensing, and IT security solutions, are recognizing the exceptional progress made by the Scandinavian and Baltic Sea nations towards truly digital societies and connected economies with a dedicated corporate entity for the company’s business in the Nordic countries and their neighbors across the sea.

New Research Finds 91% of Industrial Companies Open to Cyber-Attacks

  • September 2, 2021
  • News

Positive Technologies today released new research that examines information security risks present in industrial companies, the second-most targeted sector by cybercriminals in 2020. An external attacker can penetrate the corporate network at 91% of industrial organizations.

MITRE Engenuity Releases First ATT&CK® Evaluations for Industrial Control Systems Security Tools

  • July 19, 2021
  • News

MITRE Engenuity today released results from its first round of independent ATT&CK® Evaluations for Industrial Control Systems (ICS). The evaluations examined how cybersecurity products from five ICS vendors detected the threat of Russian-linked Triton malware.

Why Hackers Attack ICS Products and How to Stop Them

  • by Melissa Landon
  • June 7, 2021
  • Feature

The global instability and increase in remote work caused by the pandemic have played a role in raising the salience of ICS cybersecurity issues. In particular, phishing attacks and spam campaigns are becoming more common. Here's how to stop them.

Closing the IoT Security Gaps in your ICS

  • by Patrick Bedwell
  • June 2, 2021
  • Feature

Understand these factors to protect mixed ICS and IoT environments. This article comes from the Ebook Automation 2021: OT/ICS Cybersecurity.

Open Secure Remote Operations: A Vision Fulfilled

  • by Albert Rooyakkers
  • May 20, 2021
  • Feature

Improving efficiency through real-time monitoring and control of distributed equipment. This article is from the Ebook Automation 2021: OT/ICS Cybersecurity.

Colonial Pipeline Ransomware Attack: Revealing How DarkSide Works

  • by Alexey Kleymenov
  • May 19, 2021
  • Feature

Nozomi Networks Labs has studied the internals of the DarkSide executable and today we’re sharing our findings to reveal the techniques used by its machine code in three areas: the selection of victims and files, ensuring anonymity and anti-detection, and preventing data restoration. We also provide IoCs and decryption script to help you detect DarkSide.