Cisco Industrial Security
The Bridge to Secure Modern Port Operations
4 min read
In today’s digitally-enabled ports and terminals, yesterday’s old security perimeter is insufficient. Adopting a zero trust security strategy is necessary to successfully modernize port operations.
Investing in Secure Maritime Operations: Cisco at “Hack the Port 22”
2 min read
The resounding message is clear: port and terminal operators, who are undertaking much-needed digital modernization efforts, must simultaneously implement improved cybersecurity capabilities that are designed and “built-in” to the industrial network infrastructure from the start. By connecting more equipment, devices, people, applications and embracing greater digitization, global port operators are realizing improved results – including […]
Mitigating new Industroyer2 and Incontroller malware targeting industrial control systems
4 min read
Advanced persistent threat actors have unleashed new malware to gain full system access to industrial control systems.
Five lessons manufacturing operations can learn from enterprise IT teams
4 min read
OT experts in digital manufacturing borrow tried-and-true practices from IT teams to keep the network high performing, available, and secure.
Securing digital manufacturing—from a vicious to a virtuous circle
3 min read
How to establish a trusted relationship between operation teams and IT to build reliable and efficient industrial networks.
Cisco IoT sweeps industry awards
2 min read
What drives the widespread appeal of our IoT portfolio? It meets the wide variety of use cases, access technologies, and protocols of edge requirements.
Supply chain efficiency starts with securing port operations
3 min read
Fend off disruption from ransomware or other attacks.
Secure Energy Operations
3 min read
Oil & Gas companies have a very diverse collection of assets for their pipeline, plant, and production operations so asset inventory and visibility is foundational to strong security.
Secure Mine Operations
3 min read
Mining companies have a very diverse collection of assets for their above ground and underground operations so asset inventory and visibility is foundational to strong security.