Articles

Benefits of a comprehensive cybersecurity procurement process

Cybersecurity is a critical concern for organizations, independent of their sizes, operating industries or ecosystems. As potential threats are growing globally, so too does the cybersecurity market. A challenge that purchasers of cybersecurity products face is a need for more transparency. The cybersecurity market currently has around 7000 vendors; the global cybersecurity market is expected …

Benefits of a comprehensive cybersecurity procurement process Read More »

Public Key Infrastructure (PKI) for IoT and IIoT device manufacturers

Identity and access management (IAM) systems in typical enterprise IT environments rely on a chain of trust that is rooted in human identities: For example, a personal ID, our social security number, and other official documents that are based on our birth certificate registered and stamped by a public authority. PKI systems are a way …

Public Key Infrastructure (PKI) for IoT and IIoT device manufacturers Read More »

Essential organizational measures and the role of an ISMS

As the world becomes increasingly connected and reliant on technology, cybersecurity has become a critical concern for organizations of all sizes. Cyber threats come in many forms, from phishing scams and malware to ransomware attacks and data breaches, and they can have serious consequences for businesses, including financial losses, damaged reputations, and legal liabilities. According …

Essential organizational measures and the role of an ISMS Read More »

More security for your budget: Savings potential in IT security procurement

Cybersecurity has been seen as an inefficient and non-transparent market: more than 7000 vendors, distributors, resellers, managed security service providers, and consultancies approach IT leaders with a similar message: “Buy my product or service (and buy it now), or you won’t be safe!”. But a key fact should be addressed: on average, between one-third and …

More security for your budget: Savings potential in IT security procurement Read More »

Considerations for purchasing IoT vulnerability management solutions

The category of IoT product security platforms is relatively new. The solutions are also referred to as: “firmware analysis”, “OT/IoT software supply chain security”, “automated security for embedded systems”, “networked device vulnerability assessment”, “reverse engineering/digital twin” or “automated security and compliance for digital products”. The solutions differ significantly in what they can ingest, analyze and …

Considerations for purchasing IoT vulnerability management solutions Read More »

Considerations for purchasing OT remote access solutions

Remote access solutions for OT environments are purchased either by plant operators, who usually use a variety of suppliers for control systems and machines in their plants, or by manufacturers of industrial automation technology and machine builders. Of course, there are conflicts of interest here: machine builders would prefer all their customers to use the …

Considerations for purchasing OT remote access solutions Read More »

Days
Hours
Minutes
Cyber Summit - Bridging IT & OT Security
18. April 2024 | 08:30 AM - 12:15 PM | Virtual Event
231219_BoschCC_Logo_White