The Necessity of Converged IT/OT SOC in Strengthening Cybersecurity for Today's Industrial Landscape

The Necessity of Converged IT/OT SOC in Strengthening Cybersecurity for Today's Industrial Landscape

In the rapidly advancing technological landscape, industrial organizations face escalating cyber threats. To fortify cybersecurity, embracing a Converged IT/OT SOC is imperative. Yokogawa's cloud-based IT/OT SOC service provides a holistic defense, offering integrated visibility, proactive measures, and real-time monitoring. As cyber threats evolve, businesses can stay ahead with Yokogawa, safeguarding operations effectively in the cybersecurity race.

Read More

Enhancing Energy Security Unveils the Power of Convergence and Yokogawa's Cybersecurity Program

Enhancing Energy Security Unveils the Power of Convergence and Yokogawa's Cybersecurity Program

In an age of looming cyber threats, the energy sector's vulnerability is glaring. Embracing IT-OT convergence is vital to combat these risks. Explore the benefits, challenges, and the pivotal role of Yokogawa's cybersecurity program in safeguarding energy systems against cyber threats. Discover more in our enlightening infographic, here: Access the infographic. Convergence merges security aspects for a unified defense, yet poses new risks. The Colonial Pipeline incident highlighted the cascading impact of IT breaches on OT systems. Yokogawa's comprehensive cybersecurity program addresses these challenges, offering tailored solutions, risk assessment, layered defense, monitoring, and employee education. Join us in fortifying cybersecurity posture.

Read More

Why Technology Alone Will Not Solve Industrial Cyber Security Threats

Why Technology Alone Will Not Solve Industrial Cyber Security Threats

Know your adversary – this is surely one of the essential steps in any program to improve security? If you don’t understand the nature of the threat, whether it is a human threat such as warfare or, more topically, a natural threat such as the novel coronavirus, then you are not going to understand how to protect yourself adequately.

Read More

Managing operational technology security in a changing business environment

Managing operational technology security in a changing business environment

Organizations are seeking to transform their businesses through digitalization, improving work flows and processes, adapting organization culture and changing supply chain relationships.

Although Digitalization can deliver significant value for organizations, it also increases the threat surface which, if not effectively managed, can create significant cyber security risks for industrial environments. In this article, Donal explores the changing business landscape and countermeasures to reduce cyber risk.

Read More

Industrial Cyber Security – Securing Operational Technology 101

Industrial Cyber Security – Securing Operational Technology 101

In the modern connected enterprise where your industrial systems are networked to your business systems (which they almost certainly are) and your business systems are Internet facing (again very likely) then your business systems should be regarded as a potential source of threat to the integrity, safety and security of your control systems. That threat should be properly managed.

Read More

Digital Security & Off-the-Shelf Solutions

Digital Security & Off-the-Shelf Solutions

Like physical security, the investment in digital security is a function of what we are trying to protect and the company's exposure if breached. It is not only a necessity to have a digital security system, but to also be keep abreast of the changes and threats that effect such security systems. Read about how the evolution of technologies put strong pressures on companies and operations, as well as the updates being made to common off-the-shelf digital security solutions.

Read More

Japan's Approach to Cyber-Security: Expectations for Tokyo 2020

Japan's Approach to Cyber-Security: Expectations for Tokyo 2020

The Olympic flag was handed to Prime Minister Abe to conclude the Rio de Janeiro Onlimpic Games. It is time for Japan must fully commit to protect the people of Japan and visitors from cyber-attacks. This article reviews the current regulations and what will be necessary to keep Japan prepared for the 2020 Olympic games, and beyond.

Read More

The Advent of Drones & the threats they bring

The Advent of Drones & the threats they bring

Recently, expert Jeff Melrose spoke at the prestigious security conference Blackhat in Las Vegas, Nevada on the topic of drones that can be bought off-the-shelf and used in cyber crime. Watch a James Bond parody on how drones can be used to implement a cone of silence on both stationary targets and moving targets.

Read More

New Solution Enables Customer to Take Preventive Measures against Cyber-Attacks

New Solution Enables Customer to Take Preventive Measures against Cyber-Attacks

Cybersecurity experts at Yokogawa headquarters provide a fit-for-purpose Network Healthiness Check Service, developed in 2015. The service is meant identify deviations from normal network behaviors so that appropriate preventive measures against attacks could be taken, and improved upon.

Read More

SecureIT - Cyber Security for Plug-ins

SecureIT - Cyber Security for Plug-ins

With web content becoming ever more dynamic, it’s now necessary for even casual users to be aware of Plug-in helper applications, and the vulnerabilities that they create. As the sophistication of hacker groups continues to grow, the dark side to Plug-in use becomes more threatening; as web Browsers inherently trust such Plug-ins, an unguarded backdoor if left open for unintended remote execution of malware. 

Read More

Cyber Doctors: Your Solution to the Common (and uncommon) Cold

Cyber Doctors: Your Solution to the Common (and uncommon) Cold

Just like the human body, even a healthy and well-managed industrial plant is susceptible to catching a cold. When a major plant catches a cold, however, it can effect millions. Read our introduction to a our recent video explaining the parallels in the importance on monitoring and maintaining a healthy facility.

Read More

How-To: Create Passwords that are Complex & Easy-to-Remember

How-To: Create Passwords that are Complex & Easy-to-Remember

It can be daunting to come up with and remember multiple passwords to meet the demands of complex password filters of the several e-businesses and social sites that we use everyday. But now using an easy to remember method you too can create complex passwords with the best security professionals. Learn from Jeff Melrose in our second article in our SecureIT series. 

Read More

SecureIT - Basic Cyber Defense

SecureIT - Basic Cyber Defense

The first article in a new security series: 'SecureIT.'  In this article, Jeff Melrose explains the various threats, key points, and simple tips in mitigating up to 85% of cyber intrusions. Learn about why it is necessary for all PC and mobile users to perform regular security administration functions, at the very least. 

Read More