Security Breach: Minimizing Hacks by Focusing on Uptime

Staff
By Staff
2 Min Read

Next to artificial intelligence, one of the biggest buzz terms in industrial cybersecurity right now might be SBOM, or software bill of materials. The term generates equal parts concern and eye roll as those entrusted with enterprise defense look to ensure that there are no embedded vulnerabilities amongst the data platforms they are both sourcing and utilizing within their offerings. 

Perhaps most frustrating is having to essentially reverse engineer a number of established products in order to quell security concerns. However, as frustrating as these efforts might be, the growing number of zero day hacks emanating from embedded security vulnerabilities will only continue to grow as we look to embed greater levels of sensor, software and AI-driven functionality. 

In this episode we hear from Marcellus Buchheit, President and CEO of Wibu-Systems USA, a leading provider of security solutions for embedded data and intellectual property. Watch/listen as we discuss:

  • How vulnerabilities and risks need to be assessed beyond their expense to focus on updates, reconfigurations and the growing number of OT connection points.
  • The need for SOPs that make it easier to assimilate cybersecurity into OT processes.
  • Ways to more safely update the growing number of devices on the plant floor.
  • Protecting IP and, more specifically, the software coding associated with it.
  • The impact AI continues to have on increasing the sophistication of hacking attempts.
  • Why all hacks are “highly preventable.”
  • The role of quantum computing and the steps to take in preparing for “Q Day”.

To catch up on past episodes, you can go to Manufacturing.netIEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

To download our latest report on industrial cybersecurity,  The Industrial Sector’s New Battlefield, click here.

Share This Article
Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *