HouseCall for Home Networks
Noticed any strange devices connected to your Wi-Fi?
Scan connected devices in your home network for security risks
Scan connected devices for security risksLearn more
The Industrial Internet of Things (IIoT) is the leading edge of the convergence of Operational Technology (OT) with IT. This convergence begins with network connectivity but requires enhancements in operational procedures, technology, and training as well.
DALLAS--(BUSINESS WIRE)--Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, has announced a new partnership with Moxa Inc., a leader in industrial communication and networking, as part of its Technology Alliance Partner Program to jointly develop state-of-the-art solutions to protect Industrial Internet of Things (IIoT) environments like smart manufacturing and smart energy.
The IIoT is a catalyst for development in many industries. For manufacturing, IIoT innovation is best demonstrated by one of its prominent models, the smart factory.
According to Ku, “Thirty years ago people looked at security on the IT side as an afterthought and this is what’s happening on the OT side today”
Today’s highly automated and connected smart factories (Industry 4.0) were born out of yesterday’s steam engines that mechanized manufacturing (Industry 1.0); mass-production lines expanded with the advent of electricity (Industry 2.0); and then IT-enabled manufacturing plants ushered in the era of connected industrial control systems with programmable logic controllers (PLC).
At recent Industrial IoT security briefings, the Aurora vulnerability has come up repeatedly. Attendees ask, “Is our country’s power grid safe? How can we protect the grid? What is Aurora?” This post provides a look at Aurora, and the BlackEnergy attack that can exploit Aurora.
Blockchain is one of the key concepts in IoT conversations today, touted to accelerate the scaling of IoT implementations. However, due to its nascent nature, what could be the potential risks, and how can blockchain play a role in IoT security?
Trend Micro CEO Eva Chen recently shared her insights on cybersecurity for industrial control systems (ICS) in an interview with IIoT World co-founder, Lucian Fogoros. IIoT World is the first global digital publication dedicated to the connected industry and Industrial Internet of Things (IIoT).
At Trend Micro we’ve made it our business over the past 30 years to anticipate where technology is taking the world. That’s why it was great to take our new message Securing the Connected World to an audience of Industry 4.0 experts at Hannover Messe last week.
The evolution of the Internet of Things (IoT) has made life a lot more convenient and productive for both consumers and businesses alike over past few years, but on the other side, cybersecurity is an emerging challenge. For automobile original equipment manufacturers (OEMs), Tier 1 suppliers, car dealers, service providers, car owners and drivers, cyberattacks are now a reality that they have to grapple with.
In our 2017 NGIPS Group Test, Trend Micro made an impressive demonstration of performance and security,” said Vikram Phatak, CEO of NSS Labs. “Overall, no tradeoffs seem to have been made when achieving the compact 1U form factor of the new TX series.
The ‘WannaCry” and “Petya” (also known as NotPetya or GoldenEye) outbreaks rank as the most damaging global cyber security incidents during the first half of 2017. These massive ransomware attacks impacted the networks of hospitals, factories, and railroads in many different countries with serious consequences.
In 2016, an independent study recognized the manufacturing industry as the second most attacked industry. While the healthcare sector is still the most frequently attacked, attacks on manufacturing come as no surprise since it's an expansive industry that includes the automotive, textile, electronic and other subgroups that manufacture a multitude of different products.
Technology has certainly changed how the world works, influencing almost every aspect of modern life. But while modern technology undeniably brings a number of advantages across multiple sectors, it also has its share of downsides.
“Trend Micro’s Deep Discovery achieved a 100% security effectiveness rating with the fastest time to detect attacks amongst all tested products,” said Vikram Phatak, CEO of NSS Labs. “There is no question that Deep Discovery should be on the short list for everyone considering a Breach Detection solution.”