We have seen through the previous articles the solutions allowing to initiate the security of Industrial IS. Once this securing has been achieved, the maintenance in security conditions must be ensured as well as the implementation of detection means. Managing…
Category: Manufacturing & Industry 4.0
After having discovered the premises of securing Industrial IS through the mapping of these systems and their partitioning, we will now explain their administration. Administration – the nerve center of network architecture Good administration of an IS is essential…
For several years now, we’ve been supporting the far-reaching changes affecting industrial information systems which are being increasingly forced to open up to the broader market and corporate IS technologies. As levels of exposure and threats increase, carrying out security…
Nous avons vu au travers des articles précédents les solutions permettant d’initier la sécurisation des SI Industriels. Une fois cette sécurisation réalisée, le maintien en conditions de sécurité doit être assuré tout comme la mise en place de moyens de…
Because of their accessibility and ease of use, USB sticks and other USB storage devices are widespread and commonly used. In this article, all these devices will be referred to as ‘removable media’. Industrial networks also called ‘OT’ (Operating Technology)…
Si la sécurité physique des passagers et de leur environnement est aujourd’hui une composante fondamentale du monde automobile, la cybersécurité commence elle aussi à être mise en lumière, notamment depuis la publication des travaux initiés par Charlie MILLER et Chris…
The revolution is underway! The vehicles we drive will become ever-more connected and autonomous in the near future, something that will open the door to new uses. The user experience, in terms of mobility, will undoubtedly be better, but the…
On the occasion of the cybersecurity month and while the Mondial Paris Motor Show has just closed down, Here is a little background on the study released during the Vivatech event dedicated to startup and technological innovation, called "How are…
The development of connected cars – and eventually autonomous cars – requires the presence of more and more software-driven electronic components in vehicles, as well as new interfaces allowing them to be connected to other devices and infrastructures. In a…
>>FOCUS Last year, the National Health Service England (NHS) faced its most important cybersecurity crisis due to the Wannacry ransomware attack. In October 2017, the National Audit Office (NAO) published a report showing that at least 34% of trusts in…