• TOP
  • Smart Factory

Smart Factory

2018/05/21

Blockchain: The Missing Link Between Security and the IoT?

Blockchain: The Missing Link Between Security and the IoT?

Blockchain is one of the key concepts in IoT conversations today, touted to accelerate the scaling of IoT implementations. However, due to its nascent nature, what could be the potential risks, and how can blockchain play a role in IoT security?

2018/05/07

CEO Interview: Eva Chen Meets with ‘IIoT World’

CEO Interview: Eva Chen Meets with ‘IIoT World’

Trend Micro CEO Eva Chen recently shared her insights on cybersecurity for industrial control systems (ICS) in an interview with IIoT World co-founder, Lucian Fogoros. IIoT World is the first global digital publication dedicated to the connected industry and Industrial Internet of Things (IIoT).

2018/05/03

Securing the Connected Industrial World with Trend Micro

Securing the Connected Industrial World with Trend Micro

At Trend Micro we’ve made it our business over the past 30 years to anticipate where technology is taking the world. That’s why it was great to take our new message Securing the Connected World to an audience of Industry 4.0 experts at Hannover Messe last week.

2017/12/24

Trend Micro Cybersecurity Reference Architecture for Operational Technology

Trend Micro Cybersecurity Reference Architecture for Operational Technology

The evolution of the Internet of Things (IoT) has made life a lot more convenient and productive for both consumers and businesses alike over past few years, but on the other side, cybersecurity is an emerging challenge. For automobile original equipment manufacturers (OEMs), Tier 1 suppliers, car dealers, service providers, car owners and drivers, cyberattacks are now a reality that they have to grapple with.

2017/11/07

Trend Micro Delivers Appliance with Industry’s Fastest Network Inspection in the Smallest Form Factor

Trend Micro Delivers Appliance with Industry’s Fastest Network Inspection in the Smallest Form Factor

In our 2017 NGIPS Group Test, Trend Micro made an impressive demonstration of performance and security,” said Vikram Phatak, CEO of NSS Labs. “Overall, no tradeoffs seem to have been made when achieving the compact 1U form factor of the new TX series.

2017/11/06

Smart Factory Security Part 4: Lessons Learned from the WannaCry Attack

Smart Factory Security Part 4: Lessons Learned from the WannaCry Attack

The ‘WannaCry” and “Petya” (also known as NotPetya or GoldenEye) outbreaks rank as the most damaging global cyber security incidents during the first half of 2017. These massive ransomware attacks impacted the networks of hospitals, factories, and railroads in many different countries with serious consequences.

2017/11/02

Taking Steps towards Secure Manufacturing

Taking Steps towards Secure Manufacturing

In 2016, an independent study recognized the manufacturing industry as the second most attacked industry. While the healthcare sector is still the most frequently attacked, attacks on manufacturing come as no surprise since it's an expansive industry that includes the automotive, textile, electronic and other subgroups that manufacture a multitude of different products.

2017/10/23

Security Risks in a Technology-Driven World

Security Risks in a Technology-Driven World

Technology has certainly changed how the world works, influencing almost every aspect of modern life. But while modern technology undeniably brings a number of advantages across multiple sectors, it also has its share of downsides.

2017/10/19

Trend Micro Achieves Perfect Score of 100 Percent Breach Detection in 2017

Trend Micro Achieves Perfect Score of 100 Percent Breach Detection in 2017

“Trend Micro’s Deep Discovery achieved a 100% security effectiveness rating with the fastest time to detect attacks amongst all tested products,” said Vikram Phatak, CEO of NSS Labs. “There is no question that Deep Discovery should be on the short list for everyone considering a Breach Detection solution.”

2017/10/15

Siemens Update Addresses Critical Vulnerability Found in Measuring Device

Siemens Update Addresses Critical Vulnerability Found in Measuring Device

Siemens recently issued an update that addresses a vulnerability found in one of their measuring devices that could potentially allow an attacker to bypass built-in authentication measures and take control of the machine. Discovered by researcher Maxim Rupp, CVE-2017-9944 affects the 7KT PAC1200 smart meter, a multichannel measuring device that allows users to monitor their energy consumption via easily installed sensors.

2017/07/06

Industrial Cyber Security: Why IT and OT collaboration is no longer an option but a necessity

Industrial Cyber Security: Why IT and OT collaboration is no longer an option but a necessity

Since the mid-1990s, many industrial companies have interconnected their industrial control systems (ICSs) to improve productivity, maintenance, and safety in the operational environment. Some of this interconnectivity was to the Internet. While, this connectivity helped to improved the efficiency, security was at best a minimal consideration.

2017/05/03

Rogue Robots: Testing Industrial Robot Security

Rogue Robots: Testing Industrial Robot Security

Industrial robots have replaced humans in a lot of large-scale production and manufacturing activities because of their efficiency, accuracy, and safety. These mechanical, programmable devices can now be seen in practically all industrial sectors?making cars, fabricating airplane parts, assembling food products, and even providing critical public services.

2017/04/04

Smart Factory Security Part 3: Ransomware countermeasures for factory operations

Smart Factory Security Part 3: Ransomware countermeasures for factory operations

While transitioning from regular factories to smart factories, the gap in awareness between information technology (IT) and operational technology (OT) security measures is one of the most crucial challenges to overcome. In this blog, we will take a look at the threat of ransomware. It will be used as an example to look at the current state of cyberattacks that significantly impact the stability of connected factory operations, as well as effective security measures that can be practiced.

2017/01/31

Smart Factory Security Part 2: What Management Should Know in Securing a Factory

Smart Factory Security Part 2: What Management Should Know in Securing a Factory

Regardless of whether a factory becomes a smart factory or not, truly effective security measures are not something that can be achieved through responses in the field or system changes alone. In order to protect a business’s continuity from security threats, it is necessary for management to correctly understand its importance and relay courses of action to the field.

2017/01/26

Why Do Attackers Target Industrial Control Systems?

Why Do Attackers Target Industrial Control Systems?

Industrial Control Systems (ICS) are found everywhere–from automated machines that manufacture goods to an office building’s cooling system.
Previously, it was standard that ICS were based on specific OS and specific communication protocols. However, in recent years, system development costs have been reduced and productivity has been improved by implementing network connection based on general purpose OS and standard communication protocols.

PageTop