Articles

Audiohead
dreamstime_m_96376908
GuidePoint Security report sees 102% year-over-year increase in ransomware victims and a 56% surge in number of groups behind that type of cyberattack. A separate Armis study ...
Thanapol Mongta
dreamstime_m_264850937
Third-party supplier networks can fall prey to cyberattack, but exchanges ensure every file transfer, document share, and system integration is verified, encrypted, and monitored...
Abstract © Nawadoln Siributr
dreamstime_m_92824317
Paper from Palo Alto Networks and Siemens emphasizes the risks to SCADA systems and OT devices connected to the public internet.
Stevanovicigor
dreamstime_m_133405576
The security adviser at Silverfort weighs in on the convergence of OT and how it's reshaping cybersecurity, why manufacturing is so often targeted, and AI and IoT's role in the...
Bsenic
dreamstime_m_47881491
ReliaQuest report for Aug. 1, 2024, through Jan. 31, 2025, noted a “turbulent threat landscape” with attackers ramping up their abuse of remote external services software.
Denisismagilov
dreamstime_m_332253580
Sponsor Yubico provided the platform for three panelists, including Smart Industry's Scott Achelpohl, to discuss cyber defense and what manufacturers can do now that threat actors...
Niall Wiggan
dreamstime_m_237968415
What if the bad guys manage to destroy, damage, or encrypt your backup data in addition to your production data? In that case, you're pretty much out of luck.
Andrii Yalanskyi
dreamstime_m_322829283
Downtime at critical sites, whether the result of an outage or a ransomware or other cyberattack, can lead to millions in losses.
Svetlana Diacenco
dreamstime_m_320591758
As we have seen with Boeing Co. and others, ransomware—online extortion schemes perpetrated against vulnerable companies—remains a top concern. And OT and the vast supply chain...
Leowolfert
dreamstime_m_95573365
Assessing and repelling external threats to your production line can’t come at the expense of preventing damage from regulatory penalties that can be as costly or more so than...
Benzoix
dreamstime_m_314408650
The convergence of security and network operations is no longer a luxury—it’s an imperative—before the next wave of cyber threats, particularly AI-powered attacks.
Yana Lysenko
dreamstime_m_324284666
This process happens on schedule, according to rules set up by IT admins, freeing up IT personnel from the painstaking manual process while allowing patches to be rolled out quickly...
Gennady Kurinov | Dreamstime
dreamstime_m_72913465
Programmable logic controllers have become more interconnected and integrated into larger networks—and as a result they’ve become much more vulnerable to cyberattacks.
Ognyan Chobanov | Dreamstime
dreamstime_m_106882953
Curious minds want to know, so please tell us what your organization is doing to shield your vital production assets.
Emilyprofamily | Dreamstime
dreamstime_m_314986621
Are you prepared? Five tips manufacturers can follow to raise their defenses against production-crippling cyberattacks on their networks and systems.