In the latest weekly update, editors at Information Security Media Group discuss why a growing number of U.S. and Canadian hospitals have been forced to turn away patients because of cyberattacks, innovations that have surfaced during the Israel-Hamas war and the future of industrial automation.
Remote 3rd-party access is a particular problem in OT environments compared to IT environments, since OT often uses older legacy systems with longer replacement cycles. Consequently, the operators may not be familiar with using more advanced systems with remote connections as they more often work on-site.
Also, there...
Microsoft spent the past year testing how generative AI can boost productivity, accelerate learning curves and drive collaboration for itself, its partners and its customers. Microsoft infuses generative AI into every product it builds and now uses generative AI to build generative AI capabilities.
Heavy reliance on legacy systems by the manufacturing organizations have led to cyberattacks becoming more frequent, complex and nuanced over the past two years. Rockwell Automation has sought to build cyber resilience and mitigate risk in industrial operations.
Rockwell's automation efforts have moved away from a purely programmed approach to one that combines programming and self-learning based on specified parameters. Rockwell trained autonomous vehicles using real-time learning and millions of images that capture optimal behavior by human drivers.
Rockwell Automation's acquisition of industrial cybersecurity vendor Verve will help businesses better handle one of the biggest challenges with critical infrastructure: asset identification. Industrial organizations need to manage plants located all over the world, and some of them are very old.
This podcast delves into the concept of protocol isolation - a security measure that isolates network protocols and the assets to which they are connected. Grant Burst of Wallix addresses the challenges of implementing protocol isolation and provides practical solutions for securing your OT network.
Remote third-party access is a particular problem in OT environments compared to IT environments, since OT often uses older legacy systems with longer replacement cycles. Nicolas Moskal provides a demonstration of practical solutions to overcome these challenges.
Unveiling a vision of factory workers using AI chatbots to control the assembly line, fix production issues and develop code, Rockwell Automation plans to buy an industrial cybersecurity vendor and team up with Microsoft's generative AI practice to speed automation design and development.
Tenable held steady atop Forrester's vulnerability risk management rankings while Vulcan Cyber broke into the leaders category and Rapid7 and Qualys tumbled from the leaderboard. The way vendors deliver vulnerability management has shifted away from ingesting vulnerability assessment results.
Crown Jewel Analysis (CJA) is an iterative process that works top-down to systematically determine the physical & logical assets, data, and communication & control interfaces required for primary system function. Knowing the specific devices required for operation enables every aspect of vulnerability management,...
This week, Bitsight found a lot of internet-exposed industrial control systems, Apple issued new patches, Sony confirmed a data breach, Google and Yahoo tackled spam, Qualcomm patched three zero-days, Cisco revealed zero-day exploits in VPN, and the FBI warned of twin attacks.
Join us as thought leaders in industrial cybersecurity, Robert M. Lee, CEO & Co-founder of Dragos, and Blake Moret, Chairman & CEO of Rockwell Automation, delve into critical topics surrounding the current state of manufacturing cybersecurity, manufacturers' responses to increasing risks, and the journey to enhance...
In our latest weekly update, ISMG editors discuss key takeaways from a forum on developing a strategy for OT security, guidance issued by the U.S. Food and Drug Administration on cybersecurity in medical devices, and how the acquisition of Splunk by Cisco might affect the cybersecurity industry.
It's not just medical device cybersecurity that's keeping some healthcare security leaders up at night - it's also the risks posed by other critical connected gear that patients and clinicians depend upon, said Ali Youssef, director of medical device and emerging tech security at Henry Ford Health System.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.