Carrier Grade Security Means … Using Carrier Grade Security

It’s a common mistake in enterprises to copy-paste security solutions from a peer. Strategies can be recycled, but sadly with even very similar businesses almost always have radically different IT and security requirements. I recall one hospital that looked at a nearly identical peer hospital that was only a few miles away. Much of the…
The post Carrier Grade Security Means … Using Carrier Grade Security appeared first on . Read More HERE…

Read more

Our Extensive Survey on IoT Cybersecurity Has Remarkable Top Consequence

Trend Micro recently conducted a global survey of IT and security decision makers. When asked about the top consequence to IoT security, many would have expected it to be data loss. However, the top consequence named with 52% of respondents was “Loss of Customer Trust.” IoT has a physical component that is unusual in the…
The post Our Extensive Survey on IoT Cybersecurity Has Remarkable Top Consequence appeared first on . Read More HERE…

Read more

Preparing for Shadow OT: A Hospital Case Study

The convergence of IT and OT is happening more rapidly than IT expects. Once upon a time, IT was so expensive that enterprises built entire departments to prioritize spending and efficiently manage those costly investments. Now, IT is so inexpensive that any individual who wants IT can buy it (or rent it). This is “Shadow…
The post Preparing for Shadow OT: A Hospital Case Study appeared first on . Read More HERE…

Read more

How the Industry 4.0 Era Will Change the Cybersecurity Landscape

Today’s highly automated and connected smart factories (Industry 4.0) were born out of yesterday’s steam engines that mechanized manufacturing (Industry 1.0); mass-production lines expanded with the advent of electricity (Industry 2.0); and then IT-enabled manufacturing plants ushered in the era of connected industrial control systems with programmable logic controllers (PLC). While enterprises struggle to enhance…
The post How the Industry 4.0 Era Will Change the Cybersecurity Landscape appeared first on . Read More HERE…

Read more