Articles

Thanapol Mongta
dreamstime_m_264850937
Cybersecurity

How zero-trust data exchange protects manufacturing’s private data beyond factory walls

Third-party supplier networks can fall prey to cyberattack, but exchanges ensure every file transfer, document share, and system integration is verified, encrypted, and monitored...
Abstract © Nawadoln Siributr
dreamstime_m_92824317
Cybersecurity

Another new cybersecurity study shows risks to OT can’t be ignored

Paper from Palo Alto Networks and Siemens emphasizes the risks to SCADA systems and OT devices connected to the public internet.
Stevanovicigor
dreamstime_m_133405576
Cybersecurity

OT cybersecurity challenges: Q&A with Rob Larsen

The security adviser at Silverfort weighs in on the convergence of OT and how it's reshaping cybersecurity, why manufacturing is so often targeted, and AI and IoT's role in the...
Bsenic
dreamstime_m_47881491
Cybersecurity

Spearphishing, ransomware remain top cybersecurity threats to manufacturing

ReliaQuest report for Aug. 1, 2024, through Jan. 31, 2025, noted a “turbulent threat landscape” with attackers ramping up their abuse of remote external services software.
Denisismagilov
dreamstime_m_332253580
Cybersecurity

Webinar: Cybersecurity center stage in 2025 and beyond

Sponsor Yubico provided the platform for three panelists, including Smart Industry's Scott Achelpohl, to discuss cyber defense and what manufacturers can do now that threat actors...
Niall Wiggan
dreamstime_m_237968415
Cybersecurity

Why ransomware attackers target backups—and how to ensure your data is protected

What if the bad guys manage to destroy, damage, or encrypt your backup data in addition to your production data? In that case, you're pretty much out of luck.
Andrii Yalanskyi
dreamstime_m_322829283
Cybersecurity

The cost of downtime: Manufacturing's worst nightmare and how to solve it

Downtime at critical sites, whether the result of an outage or a ransomware or other cyberattack, can lead to millions in losses.
Svetlana Diacenco
dreamstime_m_320591758
Special Reports

Crystal Ball preview: Top cybersecurity risks in 2025 and beyond

As we have seen with Boeing Co. and others, ransomware—online extortion schemes perpetrated against vulnerable companies—remains a top concern. And OT and the vast supply chain...
Leowolfert
dreamstime_m_95573365
Cybersecurity

Every cybersecurity program should include regulatory compliance

Assessing and repelling external threats to your production line can’t come at the expense of preventing damage from regulatory penalties that can be as costly or more so than...
Benzoix
dreamstime_m_314408650
Cybersecurity

Why communication is as vital as technical skills for manufacturing cybersecurity teams

The convergence of security and network operations is no longer a luxury—it’s an imperative—before the next wave of cyber threats, particularly AI-powered attacks.
Yana Lysenko
dreamstime_m_324284666
Cybersecurity

How automated patching shields vulnerable manufacturing from cyberattacks

This process happens on schedule, according to rules set up by IT admins, freeing up IT personnel from the painstaking manual process while allowing patches to be rolled out quickly...
Gennady Kurinov | Dreamstime
dreamstime_m_72913465
Cybersecurity

Crucial role of cybersecurity protection for PLCs

Programmable logic controllers have become more interconnected and integrated into larger networks—and as a result they’ve become much more vulnerable to cyberattacks.
Ognyan Chobanov | Dreamstime
dreamstime_m_106882953
Cybersecurity

Reader poll: How do you protect your OT?

Curious minds want to know, so please tell us what your organization is doing to shield your vital production assets.
Emilyprofamily | Dreamstime
dreamstime_m_314986621
Cybersecurity

Optimizing your OT/IT cybersecurity strategy for an Industry 4.0 world

Are you prepared? Five tips manufacturers can follow to raise their defenses against production-crippling cyberattacks on their networks and systems.
316749772 | Nathee Sanbooytho | Dreamstime
Cybersecurity

How to choose security for your OT operations

An effective OT security regimen must be able to secure the entire environment at a plant—the “legacy” machinery as well as the latest devices.