- by Robert J. Michalsky
- Thursday, August 08, 2019
- Industrial Cybersecurity
Building Cybersecurity into Software Applications
An April 2019 report from the Institute of Critical Infrastructure Technology (ICIT) makes the point that even though software ‘runs the world’, software security is an afterthought across virtually all industries.
The report states that this lack of software security is actually a National Threat given that this…
Read More...
- by Jim Sweeney
- Thursday, January 27, 2022
- Industrial Cybersecurity
Demystifying the Threat Modeling Process
The thought of tackling a threat model (TM) might not be the most appetizing to some people. Doing a quick Internet search, someone could get stuck under a mountain of acronyms and terms. I mean, what is a CVSS anyway? And then there are the diagrams, attack trees and feedback loops that…
Read More...
- by Steve Gandy, CFSP
- Monday, February 08, 2021
- Industrial Cybersecurity
IEC 62443 - The Evolution of IACS Cybersecurity
When we were doing safety system designs in the 1980s, there was no Windows, there was no TCP/IP, there was no in Ethernet. We had to write our own protocols to transmit data to our I/O and our controllers.
Fault-finding was always a challenge . What we ended up…
Read More...
- by Patrick O'Brien
- Wednesday, November 15, 2023
- Industrial Cybersecurity
Many Different Forces are Influencing ICS Cybersecurity Adoption
When we look at some of the challenges that are facing control systems, we also have to think about what forces are influencing how asset owners adopt cybersecurity. We'll talk about four of those main drivers that play a role in cybersecurity implementation.
National Standards…
Read More...