• TOP
  • Smart Factory

Smart Factory

2017/11/07

Trend Micro Delivers Appliance with Industry’s Fastest Network Inspection in the Smallest Form Factor

Trend Micro Delivers Appliance with Industry’s Fastest Network Inspection in the Smallest Form Factor

In our 2017 NGIPS Group Test, Trend Micro made an impressive demonstration of performance and security,” said Vikram Phatak, CEO of NSS Labs. “Overall, no tradeoffs seem to have been made when achieving the compact 1U form factor of the new TX series.

2017/11/06

Smart Factory Security Part 4: Lessons Learned from the WannaCry Attack

Smart Factory Security Part 4: Lessons Learned from the WannaCry Attack

The ‘WannaCry” and “Petya” (also known as NotPetya or GoldenEye) outbreaks rank as the most damaging global cyber security incidents during the first half of 2017. These massive ransomware attacks impacted the networks of hospitals, factories, and railroads in many different countries with serious consequences.

2017/11/02

Taking Steps towards Secure Manufacturing

Taking Steps towards Secure Manufacturing

In 2016, an independent study recognized the manufacturing industry as the second most attacked industry. While the healthcare sector is still the most frequently attacked, attacks on manufacturing come as no surprise since it's an expansive industry that includes the automotive, textile, electronic and other subgroups that manufacture a multitude of different products.

2017/10/23

Security Risks in a Technology-Driven World

Security Risks in a Technology-Driven World

Technology has certainly changed how the world works, influencing almost every aspect of modern life. But while modern technology undeniably brings a number of advantages across multiple sectors, it also has its share of downsides.

2017/10/19

Trend Micro Achieves Perfect Score of 100 Percent Breach Detection in 2017

Trend Micro Achieves Perfect Score of 100 Percent Breach Detection in 2017

“Trend Micro’s Deep Discovery achieved a 100% security effectiveness rating with the fastest time to detect attacks amongst all tested products,” said Vikram Phatak, CEO of NSS Labs. “There is no question that Deep Discovery should be on the short list for everyone considering a Breach Detection solution.”

2017/10/15

Siemens Update Addresses Critical Vulnerability Found in Measuring Device

Siemens Update Addresses Critical Vulnerability Found in Measuring Device

Siemens recently issued an update that addresses a vulnerability found in one of their measuring devices that could potentially allow an attacker to bypass built-in authentication measures and take control of the machine. Discovered by researcher Maxim Rupp, CVE-2017-9944 affects the 7KT PAC1200 smart meter, a multichannel measuring device that allows users to monitor their energy consumption via easily installed sensors.

2017/07/06

Industrial Cyber Security: Why IT and OT collaboration is no longer an option but a necessity

Industrial Cyber Security: Why IT and OT collaboration is no longer an option but a necessity

Since the mid-1990s, many industrial companies have interconnected their industrial control systems (ICSs) to improve productivity, maintenance, and safety in the operational environment. Some of this interconnectivity was to the Internet. While, this connectivity helped to improved the efficiency, security was at best a minimal consideration.

2017/05/03

Rogue Robots: Testing Industrial Robot Security

Rogue Robots: Testing Industrial Robot Security

Industrial robots have replaced humans in a lot of large-scale production and manufacturing activities because of their efficiency, accuracy, and safety. These mechanical, programmable devices can now be seen in practically all industrial sectors?making cars, fabricating airplane parts, assembling food products, and even providing critical public services.

2017/04/04

Smart Factory Security Part 3: Ransomware countermeasures for factory operations

Smart Factory Security Part 3: Ransomware countermeasures for factory operations

While transitioning from regular factories to smart factories, the gap in awareness between information technology (IT) and operational technology (OT) security measures is one of the most crucial challenges to overcome. In this blog, we will take a look at the threat of ransomware. It will be used as an example to look at the current state of cyberattacks that significantly impact the stability of connected factory operations, as well as effective security measures that can be practiced.

2017/01/31

Smart Factory Security Part 2: What Management Should Know in Securing a Factory

Smart Factory Security Part 2: What Management Should Know in Securing a Factory

Regardless of whether a factory becomes a smart factory or not, truly effective security measures are not something that can be achieved through responses in the field or system changes alone. In order to protect a business’s continuity from security threats, it is necessary for management to correctly understand its importance and relay courses of action to the field.

2017/01/26

Why Do Attackers Target Industrial Control Systems?

Why Do Attackers Target Industrial Control Systems?

Industrial Control Systems (ICS) are found everywhere–from automated machines that manufacture goods to an office building’s cooling system.
Previously, it was standard that ICS were based on specific OS and specific communication protocols. However, in recent years, system development costs have been reduced and productivity has been improved by implementing network connection based on general purpose OS and standard communication protocols.

2016/12/02

Smart Factory Security Part 1: Looking at the impact of poor cybersecurity in factories

Smart Factory Security Part 1: Looking at the impact of poor cybersecurity in factories

Through internet of things (IoT), traditional factories are becoming smart factories. Cybersecurity threats in factories and the necessity of establishing countermeasures will be explained in two parts. This first part explains cybersecurity threats in factories and the necessity of establishing suitable countermeasures.

PageTop