Manufacturing Firms Learn Cybersecurity the Hard Way

Dark Reading

Although 61% of smart factories have experienced a cybersecurity incident, IT groups and operational technology groups still don't collaborate enough on security

Cybersecurity in manufacturing

OpenText Information Management

Not long ago, many manufacturing CIOs thought that cybersecurity was something only the financial sector had to worry about. Why would anyone want to hack a manufacturing plant? How times have changed – now, cybersecurity in manufacturing is definitely front and center. I … The post Cybersecurity in manufacturing appeared first on OpenText Blogs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tracking Cybersecurity Threats in Manufacturing

Data Breach Today

With the rise of the industrial internet of things comes a far broader attack surface in the manufacturing sector. Chris Morales of Vectra outlines findings of a new report on cyberattack trends in the manufacturing sector

Medical Device Security: The Manufacturer's View

Data Breach Today

Michael McNeil of Philips on the Manufacturer's Role in Improving Device Cybersecurity Awareness of medical device security issues has grown dramatically over the past few years. But Michael McNeil of device manufacturer Philips argues that cybersecurity is still years behind where it should be, so stakeholders are playing catch-up

Cyberattack Hits Aircraft Parts Manufacturer

Dark Reading

Belgium's Asco has shut down manufacturing around the world, including the US, in response to a major cybersecurity event, but what happened isn't clear

Sierra Wireless halted production at its manufacturing sites due to ransomware attack

Security Affairs

Sierra Wireless is a Canadian multinational wireless communications equipment designer and manufacturer headquartered in Richmond, British Columbia, Canada. The post Sierra Wireless halted production at its manufacturing sites due to ransomware attack appeared first on Security Affairs.

Swiss rail vehicle manufacturer Stadler hit by a malware-based attack

Security Affairs

Stadler, a Swiss manufacturer of railway rolling stock disclosed a data breach, hackers attempted to blackmail the company. International rail vehicle manufacturer, Stadler , disclosed a security breach that might have also allowed the attackers to steal company data.

Bolstering the Cybersecurity of Medical Devices

Data Breach Today

As cybersecurity threats in the healthcare sector evolve, medical device manufacturer ICU Medical is taking a number of steps to help safeguard its products. Chaitanya Srinivasamurthy and Marshall Fryman of the company describe these security initiatives

US House Passes IoT Cybersecurity Improvement Act

Security Affairs

House of Representatives passed the IoT Cybersecurity Improvement Act, a bill that aims at improving the security of IoT devices. House of Representatives last week passed the IoT Cybersecurity Improvement Act, a bill designed to improve the security of IoT devices. The U.S.

IoT 109

GUEST ESSAY: Remote workforce exposures exacerbate cybersecurity challenges in 2021

The Last Watchdog

One of the most concerning cybersecurity trends this year is closely connected to 2020. Many IT experts are warning that it won’t be long before hackers compromise several unprotected home networks simultaneously to manufacture a forceful and large-scale breach of vital services and systems. Businesses can use a Q1 cybersecurity hygiene house cleaning to defend against fileless attacks. As a result, cybersecurity trends have developed innovative ways to exploit these changes.

FDA Reveals Steps to Bolster Medical Device Cybersecurity

Data Breach Today

Playbook' Prepared; Data Sharing Efforts Planned In its ongoing quest to improve the state of medical device cybersecurity, the FDA has announced a number of key moves - including the release of a security "playbook," plans to leverage information sharing and analysis organizations and an effort to update its 2014 premarket guidance for manufacturers

Top cybersecurity Predictions for 2020

Security Affairs

The 2020 Cybersecurity Landscape – Below Pierluigi Paganini’s cybersecurity predictions for the next twelve months. Here we are again for the annual prediction of the events that I believe will impact the cybersecurity landscape in the next year.

FDA's Kevin Fu on Threat Modeling for Medical Devices

Data Breach Today

More precise and pervasive cybersecurity threat modeling during manufacturers' development of medical devices - and also during the regulatory product review process - is critical for risk mitigation, says Kevin Fu, new acting director of medical device cybersecurity at the FDA

FDA Calls for 'Cybersecurity Bill of Materials' for Devices

Data Breach Today

Food and Drug Administration Releases Draft of Updated Pre-Market Guidance for Medical Devices Before marketing their medical devices, manufacturers should prepare a "cybersecurity bill of materials" that lists components that could be susceptible to vulnerabilities, according to a draft of updated FDA premarket guidance

The IoT Cybersecurity Act of 2020: Implications for Devices

eSecurity Planet

Last month’s passage of the IoT Cybersecurity Improvement Act of 2020 means all IoT devices used by government agencies will soon have to comply with strict NIST standards. Lastly, we touch on the political rationale of how the landmark IoT cybersecurity legislation came to be.

IoT 94

Third-Party IoT Vulnerabilities: We Need a Cybersecurity Paradigm Shift

Dark Reading

The only entities equipped to safeguard Internet of Things devices against risks are the IoT device manufacturers themselves

COVID-19 Has United Cybersecurity Experts, But Will That Unity Survive the Pandemic?

Krebs on Security

” Using threat intelligence feeds donated by dozens of cybersecurity companies, the CTC is poring over more than 100 million pieces of data about potential threats each day, running those indicators through security products from roughly 70 different vendors.

IoT Cybersecurity: 5 Major Vulnerabilities and How to Tackle Them

Security Affairs

IoT devices are exposed to cybersecurity vulnerabilities. However, if you know where the dangers lurk, there is a way to minimize the cybersecurity risks. Here are five significant cybersecurity vulnerabilities with IoT in 2020. The Flaws in Manufacturing Process.

IoT 100

ENISA Highlights AI Security Risks for Autonomous Cars

Data Breach Today

Automakers Should Employ Security-By-Design to Thwart Cyber Risks Autonomous vehicle manufacturers are advised to adopt security-by-design models to mitigate cybersecurity risks, as artificial intelligence is susceptible to evasion and poisoning attacks, says a new ENISA report

New Guidance Published on Cybersecurity and Medical Devices

Data Matters

New European medical device guidance will require manufacturers to carefully review cybersecurity and IT security requirements in relation to their devices and in their product literature. In December 2019, the Medical Device Coordination Group (MDCG) published its guidance on cybersecurity for medical devices (the Guidance). The Guidance acknowledges that even though the Regulations impose legal obligations only on the manufacturer of the device, all other actors (e.g.,

FDA Proposes Action to Enhance Medical Device Cybersecurity

Data Breach Today

Agency Seeks Congressional Authority to Require Makers to Take Certain Steps The FDA has issued plans for advancing the safety of medical devices, including a proposal to impose new cybersecurity requirements on manufacturers. Some experts say the FDA's plans are a good move, given the current device risk environment, but they warn that some proposals could prove difficult to achieve

A CIO on Carrying the Burden of Medical Device Cybersecurity

Data Breach Today

A lack of standards spelling out to manufacturers their responsibilities for addressing the cybersecurity of their medical devices - especially legacy products - has left a big burden on the healthcare entities that use these devices, says Cletis Earle, CIO at Kaleida Health

Beer-Brewer Molson Coors Reports On-Going Cyber Incident

Data Breach Today

Multiple Systems Impacted, Including Production and Shipping Capabilities The Molson Coors Beverage Company reported Thursday it is in the process of countering a cybersecurity incident that has caused system outages throughout the brewer's manufacturing process.

The Cost of Dealing With a Cybersecurity Attack in These 4 Industries

Security Affairs

A cybersecurity issue can cause unexpected costs in several different areas, which is the cost of Dealing with an attack in 4 Industries? A cybersecurity issue can cause unexpected costs in several different areas. And, the costs go up if the health care facility does not have a cybersecurity response plan to use after an attack gets identified. Manufacturing. The manufacturing industry was not always known to embrace connected technology, but that’s changing.

Alerts: Vulnerabilities in 6 Medical Devices

Data Breach Today

DHS Warns of Security Issues in Devices from Baxter, BD and Biotronik Federal authorities are sounding the alarm about cybersecurity vulnerabilities in six medical devices from three manufacturers.

Agreement on Proposal for Cybersecurity Act

Hunton Privacy

The European Commission (“Commission”), the European Parliament (“Parliament”) and the Council of the European Union reached an agreement earlier this month regarding changes to the Proposal for a Regulation on ENISA, the “EU Cybersecurity Agency”, and repealing Regulation (EU) 526/2013, and on Information and Communication Technology Cybersecurity Certification (the “Cybersecurity Act”). Cybersecurity certification framework.

GUEST ESSAY: The story behind how DataTribe is helping to seed ‘Cybersecurity Valley’ in Maryland

The Last Watchdog

With the largest concentration of cybersecurity expertise –– the “oil” — in the world, Maryland is fast changing from the Old Line State into “Cybersecurity Valley.” In addition, the state is home to 16 nationally designated cybersecurity Centers of Excellence and a state university and college system that graduates more cyber-degreed engineers than any other state. According to Cybersecurity Ventures, there will be 3.5

NIST Updates Cybersecurity Framework

Data Matters

On April 17, the National Institute for Standards and Technology (NIST) released an updated version of its standard-setting Cybersecurity Framework. Commerce Secretary Wilbur Ross announced the new release with a statement saying the “Cybersecurity Framework should be every company’s first line of defense” and “adopting version 1.1 For example, the revised introduction notes that “similar to financial and reputational risks, cybersecurity risk affects a company’s bottom line.

Beer Brewer Molson Coors Reports Ongoing Cyber Incident

Data Breach Today

says it's in the process of responding to a cybersecurity incident that has caused system outages throughout the brewer's manufacturing process. Multiple Systems Impacted, Including Production and Shipping Capabilities The Molson Coors Beverage Co.

Singapore presented the Operational Technology (OT) Cybersecurity Masterplan

Security Affairs

The Cyber Security Agency of Singapore (CSA) presented the Operational Technology (OT) Cybersecurity Masterplan to increase the resilience of Critical Information Infrastructure (CII) sectors. The Cyber Security Agency of Singapore (CSA) presented the Operational Technology (OT) Cybersecurity Masterplan to enhance the security and resilience of Singapore’s Critical Information Infrastructure (CII) sectors in delivering essential services.

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

On 16 December 2020, the European Commission adopted a proposal for a Directive on measures for a high common level of cybersecurity across the Union (“NIS II Directive”) that revises the current Directive on Security of Network and Information Systems (“NIS Directive”).

After a Year of Quantum Advances, the Time to Protect Is Now

Dark Reading

Innovations in quantum computing mean enterprise and manufacturing organizations need to start planning now to defend against new types of cybersecurity threats

Presidential Cybersecurity and Pelotons

Schneier on Security

As president, Biden can direct substantial resources to solving his cybersecurity problems. That is the real cybersecurity issue. Regulations that force manufacturers to provide better security for all of us are the only way to do that.

How To Solve The Cybersecurity Skills Shortage

Cyber Info Veritas

We’ve all read and heard somewhere about the cybersecurity skills shortage. For me, this brings up the question of how to solve the cybersecurity skills shortage. Solving the cybersecurity skills shortage should be no different. Changing the framework These are the ways that I’m proposing here on how we can close the gap on this cybersecurity skills shortage, which worked for me. There wouldn’t be a cybersecurity specialist without understanding these IT basics.

Lessons for In-House Counsel from Cybersecurity’s Front Lines

HL Chronicle of Data Protection

Recent developments reinforce the urgent need for general counsel and legal departments to deepen their focus on cybersecurity. Lessons for In-House Counsel from Cybersecurity’s Front Lines was written by members of the Hogan Lovells Privacy and Cybersecurity practice Peter M. In today’s environment, any organization can be the target of a cyberattack, regardless of industry, size, or geographic footprint.

Why You Should Teach Yourself Cybersecurity

Cyber Info Veritas

The problem comes when you or anyone want to get a job or are looking to learn about Information Technology or Cybersecurity and face the frustration when competing out there with the Pros. In highly regulated companies, such as Pharmaceuticals, their manufacturing processes are bound to procedures which are audited periodically. This is only one of many reasons why you should teach yourself about cybersecurity or any information technology related subject.

The DHS Cybersecurity Strategy: Five Pillars of Cybersecurity Goals

Thales Cloud Protection & Licensing

The recent DHS Cybersecurity Strategy was released at a crucial time when today’s cyberspace has become a new frontier for warfare for both nation states and criminal hackers. The DHS Cybersecurity Strategy is a well-thought-out framework with five pillars of cybersecurity goals to support critical infrastructure, government networks and non-government entities. All in all, the DHS Cybersecurity Strategy provides a solid framework for cybersecurity.

Shortages of talent, training haunt cybersecurity efforts

Information Management Resources

Manufacturers face serious cyber security concerns, but they continue to struggle with finding skilled professionals and might be underspending on security training. Data security Cyber security Cyber attacks

Privacy and Cybersecurity September 2019 Events

HL Chronicle of Data Protection

Paul Otto will speak on cybersecurity & patient safety at the Medical Device Manufacturers Association’s 12th Annual Medical Technology Executive Forum. The Hogan Lovells Privacy and Cybersecurity KnowledgeShare will share the latest thinking on the key privacy and cybersecurity issues faced by those with data protection responsibilities within organisations. News & Events autonomous vehicles CCPA cybersecurity GDPR medical devices patient data privacy

EUROPE: EU MDGC issues new guidance on Cybersecurity for medical devices

DLA Piper Privacy Matters

They also highlight the responsibility of the various parties involved in, for example, integration of systems or devices, and of the operators of such devices, and the need to continuously review security measures to ensure that appropriate cybersecurity measures are in place at all times.