Search
Close this search box.

Top 5 ICS Pulse Articles: January 2024

Courtesy: CFE Media and Technology

Digital media reigned supreme in the first month of 2024, with a pair of podcasts and a video interview as our highest-performing content? Industrial Cybersecurity Pulse’s top 5 articles from January 2024 covered everything from SCADA security to IT/OT convergence to operational lifecycle management. Here is our top-performing content from the past month.

1. Podcast Ep. 40: Xavier Mesrobian on SCADA Security

By Gary Cohen and Tyler Wall, CFE Media and Technology

SCADA systems have evolved over the last 25 years. Today, more and more companies are talking about cloud-based SCADA. Given recent compromises, what steps should companies take to secure cloud-based SCADA? On this podcast, Xavier Mesrobian of Skkynet Cloud Systems discusses how you should manage the cloud when it comes to security. Sponsored by: Skkynet

2. Podcast Ep. 41: Itzik Kotler on the ABC’s of Cybersecurity

By Gary Cohen and Tyler Wall, CFE Media and Technology

Advancing technology has given the world multitudes of business improvements, but it also brings complexity, which opens up new vulnerabilities. How can you keep up your cyber hygiene so you’re prepared for the next inevitable cyberattack? On this podcast, Itzik Kotler of SafeBreach discusses
legacy systems, incident response and why cybersecurity is no longer the “department of no.”

3. eBook: IT/OT Convergence – Winter Edition

By CFE Media and Technology

Historically, information technology (IT) and operational technology (OT) have functioned independently in industrial manufacturing, but digital transformation and the industrial Internet of Things (IIoT) have made the relationship between the two sides closer than ever. In this new environment, IT and OT must work together to secure systems, protect information and ensure safety. This eBook includes stories on how SOC and SOAR standards can help protect OT, what the U.S. government can do to impact cyber risk and why the holidays are a merry time for hackers.

4. How frameworks can improve operational lifecycle management

By Gary Cohen, CFE Media and Technology

Creating a comprehensive security strategy for your business requires a basic understanding that IT and OT systems are inherently different. You may have a solid IT security program in place designed to manage and monitor your networks, but if you’re ignoring the operational side of the house, some of your most important assets are probably insecure. This is even more essential with the proliferation of IoT and as more legacy OT devices get connected. So how can you get your operational security up to snuff? We talked to Marty Wachi, product marketing manager for Moxa America’s industrial cybersecurity.

5. What you need to know about secure default configuration, insecure by design and secure by design

By Dale Peterson, Digital Bond

My initial impression of the U.S. Department of Energy’s Cyber Informed Engineering and CISA’s Secure by Design effort is they are well meaning, not wrong, and unlikely to make a difference in the next three years. I hope I’m wrong. For the operational technology (OT) and industrial control system (ICS) security world, we would be better off focusing on two areas where progress is achievable in the near term and would result in large cyber risk reduction.

YOU MAY ALSO LIKE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES