Search
Close this search box.

IIoT & Cloud

Courtesy of CFE Media and Technology

Cybersecurity in the cloud: how to fortify your company

Power companies, chemical plants, hospitals and critical infrastructure rely on cloud-based services to monitor and control vital processes. This means cloud-managed facilities and industrial control systems (ICS) face omnipresent threats. Rapidly advancing technology, changing work […]

Courtesy: CFE Media

Why network discovery is critical in the ICS/IACS environment

Securing operational technology (OT) networks requires a great deal of thought when designing and implementing security. Industrial networks contain a complex mix of specialized protocols and devices, including proprietary protocols developed for specific families of […]

Courtesy: CFE Media

Stacking the deck for computer security

A new and more reliable method to defend vulnerable data on the stack, a major memory region responsible for storing computer program data for processes, has been developed by an international Penn State-led team. Such […]

Wires plugged into a network

How to secure Industry 4.0 in a highly connected world

As we head into the Industry 4.0 era — where connected Internet of Things (IoT) devices and automation will reshape industries — our world is already highly connected. According to Statista, there are more than […]

New approach allows for faster ransomware detection

New approach allows for faster ransomware detection

Engineering researchers have developed a new approach for implementing ransomware detection techniques, allowing them to detect a broad range of ransomware far more quickly than previous systems. Ransomware is a type of malware. When a […]

Courtesy of CFE Media and Technology

Cybersecurity in the cloud: how to fortify your company

Power companies, chemical plants, hospitals and critical infrastructure rely on cloud-based services to monitor and control vital processes. This means cloud-managed facilities and industrial control systems (ICS) face omnipresent threats. Rapidly advancing technology, changing work […]

Courtesy: CFE Media

Why network discovery is critical in the ICS/IACS environment

Securing operational technology (OT) networks requires a great deal of thought when designing and implementing security. Industrial networks contain a complex mix of specialized protocols and devices, including proprietary protocols developed for specific families of […]

Courtesy: CFE Media

Stacking the deck for computer security

A new and more reliable method to defend vulnerable data on the stack, a major memory region responsible for storing computer program data for processes, has been developed by an international Penn State-led team. Such […]

Wires plugged into a network

How to secure Industry 4.0 in a highly connected world

As we head into the Industry 4.0 era — where connected Internet of Things (IoT) devices and automation will reshape industries — our world is already highly connected. According to Statista, there are more than […]

New approach allows for faster ransomware detection

New approach allows for faster ransomware detection

Engineering researchers have developed a new approach for implementing ransomware detection techniques, allowing them to detect a broad range of ransomware far more quickly than previous systems. Ransomware is a type of malware. When a […]

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES