This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Cybersecurity may seem only for enterprise systems and critical infrastructure, but at the control system level there are too many gaps in the food and beverage industry.
Once a hacker connects via RDP to any computing system, unless operators take immediate action, the hacker can use this connection to log in at any time in the future, extort money, install ransomware on the computer, and/or sell the connection login/password and other data on the dark web, making an unprotected system available to anyone who wants to purchase the information.
The cryptography working group within the Internet Engineering Task Force (IETF) standards organization has chosen the Endress+Hauser-developed CPace protocol as a recommended method for use in internet standards.
Keeping ransomware out of your IT and OT systems depends on a well informed staff that plans ahead plus the proper network and cybersecurity tools to avert a disaster
A cyberattack not only creates costly downtime but also can destroy IP, cause food safety issues and just be plain expensive—whether or not you pay the ransom
Sometimes all you need is a knowledgeable system integrator or machine builder who’s “been there—done that,” when it comes to securing networks from cyberattacks
No doubt a ransomware or malware attack can shut down enterprise business systems, but cybersecurity attacks can do a lot more damage on manufacturing systems
Of late, several companies have taken hits on their worldwide IT and Web based systems. Perhaps the most recent, Canon, suffered a global ransomware attack, taking down many Canon websites and systems - also with a threat of making their private business data public. But can these IT/enterprise attacks threaten and/or damage OT systems? And what can they do to food and beverage products? Make them unsafe by altering a critical kill step or omitting preservatives? What else? I asked Barak Pereleman, VP of OT Security at Tenable, what attack vectors may pose danger to OT-based systems.
If you haven’t become serious about backups, it’s time to do so now—before a key system goes down and puts you out of business while you try to recover.
Three industries were targeted the most by cyberattacks— transportation, where state-sponsored threat actors seek to disrupt the logistical and supply capability of rivals, and banking and legal, which are industries rich with sensitive information.
Mimecast Ltd., Lexington, Mass., released its quarterly report, “Threat Intelligence Report: Risk and Resilience Insights,” which provides technical analysis and observations of evolving threats from the Mimecast Threat Center from July to September.