Over the past two decades, GreyOrange's Krishnamurthy Rajesh has seen major advancements in IT and OT technologies, with the rise of Industry 4.0, 5G wireless connections, the cloud and now AI and machine learning. These technologies increase risk, but the industry's cyber maturity is improving.
In the latest weekly update, editors at Information Security Media Group discuss why a growing number of U.S. and Canadian hospitals have been forced to turn away patients because of cyberattacks, innovations that have surfaced during the Israel-Hamas war and the future of industrial automation.
Microsoft spent the past year testing how generative AI can boost productivity, accelerate learning curves and drive collaboration for itself, its partners and its customers. Microsoft infuses generative AI into every product it builds and now uses generative AI to build generative AI capabilities.
Heavy reliance on legacy systems by the manufacturing organizations have led to cyberattacks becoming more frequent, complex and nuanced over the past two years. Rockwell Automation has sought to build cyber resilience and mitigate risk in industrial operations.
Rockwell's automation efforts have moved away from a purely programmed approach to one that combines programming and self-learning based on specified parameters. Rockwell trained autonomous vehicles using real-time learning and millions of images that capture optimal behavior by human drivers.
Rockwell Automation's acquisition of industrial cybersecurity vendor Verve will help businesses better handle one of the biggest challenges with critical infrastructure: asset identification. Industrial organizations need to manage plants located all over the world, and some of them are very old.
Digital transformation (DX) is driving the convergence of IT and OT networks, as organizations seek to reduce costs, increase productivity, and gain or maintain a competitive advantage. This convergence is enabling the integration of networking and digital communications into OT environments, as well as the use of...
The convergence of operational technology (OT) and IT networks is accelerating, driven by the need for organizations to use data collected by physical equipment and Industrial Internet of Things (IIoT) devices to identify issues and increase efficiency. However, this convergence also brings new cybersecurity...
In today's ever-changing threat landscape, security leaders face a multitude of challenges in protecting their organizations. New technologies emerge at an alarming rate, and cybercriminals are constantly developing new and sophisticated attacks.
Fortinet Security Operations helping organizations improve their...
Unveiling a vision of factory workers using AI chatbots to control the assembly line, fix production issues and develop code, Rockwell Automation plans to buy an industrial cybersecurity vendor and team up with Microsoft's generative AI practice to speed automation design and development.
Tenable held steady atop Forrester's vulnerability risk management rankings while Vulcan Cyber broke into the leaders category and Rapid7 and Qualys tumbled from the leaderboard. The way vendors deliver vulnerability management has shifted away from ingesting vulnerability assessment results.
Crown Jewel Analysis (CJA) is an iterative process that works top-down to systematically determine the physical & logical assets, data, and communication & control interfaces required for primary system function. Knowing the specific devices required for operation enables every aspect of vulnerability management,...
This week, Bitsight found a lot of internet-exposed industrial control systems, Apple issued new patches, Sony confirmed a data breach, Google and Yahoo tackled spam, Qualcomm patched three zero-days, Cisco revealed zero-day exploits in VPN, and the FBI warned of twin attacks.
Join us as thought leaders in industrial cybersecurity, Robert M. Lee, CEO & Co-founder of Dragos, and Blake Moret, Chairman & CEO of Rockwell Automation, delve into critical topics surrounding the current state of manufacturing cybersecurity, manufacturers' responses to increasing risks, and the journey to enhance...
In our latest weekly update, ISMG editors discuss key takeaways from a forum on developing a strategy for OT security, guidance issued by the U.S. Food and Drug Administration on cybersecurity in medical devices, and how the acquisition of Splunk by Cisco might affect the cybersecurity industry.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.