博客 //www.bolfhxtuuhux.tw/blog 技术专家博客的网络安全,监控,可见性和访问与网络水龙头和接入点。 en - us 3月11日星期四 2021 - 03 - 11 - t13:00:05z en - us 为什么采矿业依赖可靠的可见性和网络安全解决方案 //www.bolfhxtuuhux.tw/blog/why-the-mining-industry-relies-on-rugged-visibility-and-cybersecurity-solutions

When many think about the mining industry, they’re probably not thinking about new technologies. Instead, they might be conjuring up mental images of grueling manual labor. Scenes straight out of the 19th century, with workers swinging pickaxes and pushing carts in narrow tunnels where lighting and airflow are scarce and safety hazards plentiful.

But these impressions are no longer fully accurate. Subsurface resource extraction, like so many other industries, has become an increasingly technology-driven affair. Rio Tinto, for example, has been using industrial internet of things (IIoT) devices to operate a fleet of driverless trucks for more than a decade, and this solution has allowed it to reduce safety risks while also optimizing expenses and logistics. Likewise, Fortescue Metals Group uses connected monitors to obtain mobile views of the loads carried by its vehicle fleet, and this solution allows it to alert drivers in real time when trucks are not operating at full capacity, thereby conserving resources. Meanwhile, Goldcorp has developed an IIoT solution that uses tracking devices in miners’ helmets to determine when, where, and how to regulate air flows in mine shafts.

When many think about the mining industry, they’re probably not thinking about new technologies. Instead, they might be conjuring up mental images of grueling manual labor. Scenes straight out of the 19th century, with workers swinging pickaxes and pushing carts in narrow tunnels where lighting and airflow are scarce and safety hazards plentiful.

But these impressions are no longer fully accurate. Subsurface resource extraction, like so many other industries, has become an increasingly technology-driven affair. Rio Tinto, for example, has been using industrial internet of things (IIoT) devices to operate a fleet of driverless trucks for more than a decade, and this solution has allowed it to reduce safety risks while also optimizing expenses and logistics. Likewise, Fortescue Metals Group uses connected monitors to obtain mobile views of the loads carried by its vehicle fleet, and this solution allows it to alert drivers in real time when trucks are not operating at full capacity, thereby conserving resources. Meanwhile, Goldcorp has developed an IIoT solution that uses tracking devices in miners’ helmets to determine when, where, and how to regulate air flows in mine shafts.

网络能见度/监控 工业以太网 3月11日星期四格林尼治时间13:00:00 chris.bihary@garlandtechnology.com (Chris Bihary) //www.bolfhxtuuhux.tw/blog/why-the-mining-industry-relies-on-rugged-visibility-and-cybersecurity-solutions 2021 - 03 - 11 - t13:00:00z
制造商如何在采用工业物联网技术的同时在OT中获得充分的可视性 //www.bolfhxtuuhux.tw/blog/how-manufacturers-gain-full-visibility-in-ot-while-adopting-industrial-iot-technologies < div class = " hs-featured-image-wrapper " > < a href = " //www.bolfhxtuuhux.tw/blog/how-manufacturers-gain-full-visibility-in-ot-while-adopting-industrial-iot-technologies " title =“”class =“hs-featured-image-link”> < img src = " //www.bolfhxtuuhux.tw/hubfs/LR-shutterstock_1158833029.jpg " alt =“不完整的网络知名度”类= " hs-featured-image "风格= "宽度:汽车!重要;max-width: 50%;浮:左;Margin:0 15px 15px 0;" >

Etymologically speaking, the word “manufacturing” has its roots in a Latin phrase that means “making by hand.” In practical terms, when talking about manufacturing, you're talking about factories – that is, non-residential facilities that use powered machines to help humans turn out goods for some sort of business enterprise. You may also be thinking about industries – that is, the manufacturing of distinct types of goods such as automobiles, aerospace, electronics, chemicals, pharmaceuticals, and so on.

If you’re directly involved in industry, you also understand that manufacturing involves more than machine production. It also encompasses the machines themselves, plus the processes and systems used to control and monitor the performance of the machines.

< div class = " hs-featured-image-wrapper " > < a href = " //www.bolfhxtuuhux.tw/blog/how-manufacturers-gain-full-visibility-in-ot-while-adopting-industrial-iot-technologies " title =“”class =“hs-featured-image-link”> < img src = " //www.bolfhxtuuhux.tw/hubfs/LR-shutterstock_1158833029.jpg " alt =“不完整的网络知名度”类= " hs-featured-image "风格= "宽度:汽车!重要;max-width: 50%;浮:左;Margin:0 15px 15px 0;" >

Etymologically speaking, the word “manufacturing” has its roots in a Latin phrase that means “making by hand.” In practical terms, when talking about manufacturing, you're talking about factories – that is, non-residential facilities that use powered machines to help humans turn out goods for some sort of business enterprise. You may also be thinking about industries – that is, the manufacturing of distinct types of goods such as automobiles, aerospace, electronics, chemicals, pharmaceuticals, and so on.

If you’re directly involved in industry, you also understand that manufacturing involves more than machine production. It also encompasses the machines themselves, plus the processes and systems used to control and monitor the performance of the machines.

工业以太网 3月4日星期四格林尼治标准时间13:00:00 steve.harris@garlandtechnology.com (Steve Harris) //www.bolfhxtuuhux.tw/blog/how-manufacturers-gain-full-visibility-in-ot-while-adopting-industrial-iot-technologies 2021 - 03 - 04 - t13:00:00z
提供实时可视性,防止下一个水处理厂黑客 //www.bolfhxtuuhux.tw/blog/providing-real-time-visibility-to-prevent-the-next-water-treatment-plant-hack < div class = " hs-featured-image-wrapper " > < a href = " //www.bolfhxtuuhux.tw/blog/providing-real-time-visibility-to-prevent-the-next-water-treatment-plant-hack " title =“”class =“hs-featured-image-link”> < img src = " //www.bolfhxtuuhux.tw/hubfs/water-treatment.jpg " alt =“水处理厂黑客”类=“hs-featured-image”风格= "宽度:汽车!重要;max-width: 50%;浮:左;Margin:0 15px 15px 0;" >

It was alarming to learn in December that multiple U.S. government agencies had experienced severe data breaches as a result of cyberattacks. But for those of us who weren’t directly involved in the matter, the alarm was somewhat abstract in nature. After all, it was large-scale, international in scope, and directed at multiple targets, including NATO, the European Union, private businesses, and US federal agencies. It was blamed on hackers who had the backing of a foreign government. Its damage was also measured primarily in terms of data theft and information security.

By contrast, the alarm raised by the cyberattack on the Bruce T. Haddock Water Treatment Plant in Oldsmar, Florida, in early February felt rather concrete. It hit closer to home, as it focused on a single target in a single town. It had the potential to affect human life directly, since it involved an attempt to increase the amount of sodium hydroxide – also known as lye, a caustic substance – in the public water supply to toxic levels. It occurred shortly before Tampa, the city next door, hosted the Super Bowl, an event sure to put the area in the spotlight. And it has not been traced back to any particular source.

< div class = " hs-featured-image-wrapper " > < a href = " //www.bolfhxtuuhux.tw/blog/providing-real-time-visibility-to-prevent-the-next-water-treatment-plant-hack " title =“”class =“hs-featured-image-link”> < img src = " //www.bolfhxtuuhux.tw/hubfs/water-treatment.jpg " alt =“水处理厂黑客”类=“hs-featured-image”风格= "宽度:汽车!重要;max-width: 50%;浮:左;Margin:0 15px 15px 0;" >

It was alarming to learn in December that multiple U.S. government agencies had experienced severe data breaches as a result of cyberattacks. But for those of us who weren’t directly involved in the matter, the alarm was somewhat abstract in nature. After all, it was large-scale, international in scope, and directed at multiple targets, including NATO, the European Union, private businesses, and US federal agencies. It was blamed on hackers who had the backing of a foreign government. Its damage was also measured primarily in terms of data theft and information security.

By contrast, the alarm raised by the cyberattack on the Bruce T. Haddock Water Treatment Plant in Oldsmar, Florida, in early February felt rather concrete. It hit closer to home, as it focused on a single target in a single town. It had the potential to affect human life directly, since it involved an attempt to increase the amount of sodium hydroxide – also known as lye, a caustic substance – in the public water supply to toxic levels. It occurred shortly before Tampa, the city next door, hosted the Super Bowl, an event sure to put the area in the spotlight. And it has not been traced back to any particular source.

黑客和数据泄露 工业以太网 周四,25 Feb 2021 13:00:00 GMT harry.berridge@garlandtechnology.com(哈利Berridge) //www.bolfhxtuuhux.tw/blog/providing-real-time-visibility-to-prevent-the-next-water-treatment-plant-hack 2021 - 02 - 25 - t13:00:00z
如何保护网络完整性与单向数据二极管水龙头 //www.bolfhxtuuhux.tw/blog/how-to-protect-network-integrity-with-unidirectional-data-diode-taps < div class = " hs-featured-image-wrapper " > < a href = " //www.bolfhxtuuhux.tw/blog/how-to-protect-network-integrity-with-unidirectional-data-diode-taps " title =“”class =“hs-featured-image-link”> < img src = " //www.bolfhxtuuhux.tw/hubfs/shutterstock_231142564-LR.jpg " alt =“数据二极管龙头”class =“hs-featured-image”风格= "宽度:汽车!重要;max-width: 50%;浮:左;Margin:0 15px 15px 0;" >

Today’s critical infrastructure landscape makes up the fundamental building blocks of the connected world we live in. From the basic communication we enjoy through WiFi, internet and telephones to resources we may take for granted like energy, water, manufacturing, and transportation systems. Even our national security, such as The Department of Defense (DoD) and various Federal agencies, rely on similar operational technology (OT) environments. This critical infrastructure provides constant and reliable resources for our society, and it must be protected at all costs.

OT is the New Frontier for Cybersecurity Threats

According to Gartner’s OT Security Best Practices, “By 2021, 25% of asset-centric enterprises will adopt a hybrid model to secure operational technology (OT) environments with traditional security deployed alongside specialist OT security technology, up from 10% in 2018.”

< div class = " hs-featured-image-wrapper " > < a href = " //www.bolfhxtuuhux.tw/blog/how-to-protect-network-integrity-with-unidirectional-data-diode-taps " title =“”class =“hs-featured-image-link”> < img src = " //www.bolfhxtuuhux.tw/hubfs/shutterstock_231142564-LR.jpg " alt =“数据二极管龙头”class =“hs-featured-image”风格= "宽度:汽车!重要;max-width: 50%;浮:左;Margin:0 15px 15px 0;" >

Today’s critical infrastructure landscape makes up the fundamental building blocks of the connected world we live in. From the basic communication we enjoy through WiFi, internet and telephones to resources we may take for granted like energy, water, manufacturing, and transportation systems. Even our national security, such as The Department of Defense (DoD) and various Federal agencies, rely on similar operational technology (OT) environments. This critical infrastructure provides constant and reliable resources for our society, and it must be protected at all costs.

OT is the New Frontier for Cybersecurity Threats

According to Gartner’s OT Security Best Practices, “By 2021, 25% of asset-centric enterprises will adopt a hybrid model to secure operational technology (OT) environments with traditional security deployed alongside specialist OT security technology, up from 10% in 2018.”

网络能见度/监控 工业以太网 星期四,2月18日13:00:00 GMT jerry.dillard@garlandtechnology.com (Jerry迪拉德) //www.bolfhxtuuhux.tw/blog/how-to-protect-network-integrity-with-unidirectional-data-diode-taps 2021 - 02年- 18 - t13:00:00z
从上游到下游,网络可视性是确保油气资产安全的关键 //www.bolfhxtuuhux.tw/blog/from-upstream-to-downstream-network-visibility-is-critical-to-secure-oil-gas-assets < div class = " hs-featured-image-wrapper " > < a href = " //www.bolfhxtuuhux.tw/blog/from-upstream-to-downstream-network-visibility-is-critical-to-secure-oil-gas-assets " title =“”class =“hs-featured-image-link”> < img src = " //www.bolfhxtuuhux.tw/hubfs/lr shutterstock_1569230923 - 1. jpg”alt = "网络可见性油,class="hs-feature -image" style="width:auto !important;max-width: 50%;浮:左;Margin:0 15px 15px 0;" >

As concern about climate change grows, it’s not always easy to think about what the oil and gas industry has given the world. There’s a legitimate sense of urgency about the negative impact that hydrocarbon-based fuels have had and are continuing to have on the environment and on the atmosphere. Even so, an honest accounting reveals that the modern world would be considerably poorer without them.

We burn natural gas to heat our homes and fire the power plants that provide us with electricity. We process crude oil to make the fuels that power our automobiles, buses, trains, airplanes, and ships, and it also serves as raw materials for the lubricants that keep engines and machinery of all types running smoothly. We use both as feedstock for petrochemicals and other substances that have changed the way we live – plastics, artificial fabrics, fertilizers, detergents, and many more.

< div class = " hs-featured-image-wrapper " > < a href = " //www.bolfhxtuuhux.tw/blog/from-upstream-to-downstream-network-visibility-is-critical-to-secure-oil-gas-assets " title =“”class =“hs-featured-image-link”> < img src = " //www.bolfhxtuuhux.tw/hubfs/lr shutterstock_1569230923 - 1. jpg”alt = "网络可见性油,class="hs-feature -image" style="width:auto !important;max-width: 50%;浮:左;Margin:0 15px 15px 0;" >

As concern about climate change grows, it’s not always easy to think about what the oil and gas industry has given the world. There’s a legitimate sense of urgency about the negative impact that hydrocarbon-based fuels have had and are continuing to have on the environment and on the atmosphere. Even so, an honest accounting reveals that the modern world would be considerably poorer without them.

We burn natural gas to heat our homes and fire the power plants that provide us with electricity. We process crude oil to make the fuels that power our automobiles, buses, trains, airplanes, and ships, and it also serves as raw materials for the lubricants that keep engines and machinery of all types running smoothly. We use both as feedstock for petrochemicals and other substances that have changed the way we live – plastics, artificial fabrics, fertilizers, detergents, and many more.

工业以太网 周四,11 Feb 2021 13:00:00 GMT //www.bolfhxtuuhux.tw/blog/from-upstream-to-downstream-network-visibility-is-critical-to-secure-oil-gas-assets 2021 - 02 - 11 - t13:00:00z 肖恩·汤普森
101系列:在OT环境中的TAP vs SPAN //www.bolfhxtuuhux.tw/blog/the-101-series-tap-vs-span-in-ot-environments < div class = " hs-featured-image-wrapper " > < a href = " //www.bolfhxtuuhux.tw/blog/the - 101系列-利用- vs - SPAN -在OT -环境”标题= "类=“hs-featured-image-link”> < img src = " //www.bolfhxtuuhux.tw/hubfs/lr - 101 -利用- vs - SPAN - 1. jpg”alt = " 101系列水龙头vs跨度在OT环境”=“hs-featured-image”风格=“宽度:汽车!重要;max-width: 50%;浮:左;Margin:0 15px 15px 0;" >

Securing and monitoring your network is the ultimate goal. To accomplish this goal, teams utilize ICS security solutions designed to respond and manage threats in OT environments efficiently. To properly identify, detect, and respond to security threats and breaches, most ICS security tools focus on visibility, threat detection and monitoring, and asset visibility and management.

Implementing these security solutions, OT teams face complex challenges when it comes to architecting connectivity throughout these large and sometimes aging infrastructures that weren’t initially designed with network security in mind, including:

  • Relying on legacy switch SPAN ports for visibility, that aren’t secure, reliable or available
  • Facing different media or speed connections between the network and various tools
  • Network sprawl with a need to reduce network complexity
  • May require unidirectional connectivity for their monitoring tools
  • Require a secure air-gapped solution for virtual environments
< div class = " hs-featured-image-wrapper " > < a href = " //www.bolfhxtuuhux.tw/blog/the - 101系列-利用- vs - SPAN -在OT -环境”标题= "类=“hs-featured-image-link”> < img src = " //www.bolfhxtuuhux.tw/hubfs/lr - 101 -利用- vs - SPAN - 1. jpg”alt = " 101系列水龙头vs跨度在OT环境”=“hs-featured-image”风格=“宽度:汽车!重要;max-width: 50%;浮:左;Margin:0 15px 15px 0;" >

Securing and monitoring your network is the ultimate goal. To accomplish this goal, teams utilize ICS security solutions designed to respond and manage threats in OT environments efficiently. To properly identify, detect, and respond to security threats and breaches, most ICS security tools focus on visibility, threat detection and monitoring, and asset visibility and management.

Implementing these security solutions, OT teams face complex challenges when it comes to architecting connectivity throughout these large and sometimes aging infrastructures that weren’t initially designed with network security in mind, including:

  • Relying on legacy switch SPAN ports for visibility, that aren’t secure, reliable or available
  • Facing different media or speed connections between the network and various tools
  • Network sprawl with a need to reduce network complexity
  • May require unidirectional connectivity for their monitoring tools
  • Require a secure air-gapped solution for virtual environments
网络利用 水龙头与跨 101系列 工业以太网 周四,04 Feb 2021 13:00:00 GMT chris.bihary@garlandtechnology.com (Chris Bihary) //www.bolfhxtuuhux.tw/blog/the-101-series-tap-vs-span-in-ot-environments 2021 - 02 - 04 - t13:00:00z
为电力、水和废水公用事业启用ICS安全最佳实践 //www.bolfhxtuuhux.tw/blog/enabling-ics-security-best-practices-for-power-water-and-wastewater-utilities < div class = " hs-featured-image-wrapper " > < a href = " //www.bolfhxtuuhux.tw/blog/enabling-ics-security-best-practices-for-power-water-and-wastewater-utilities " title =“”class =“hs-featured-image-link”> < img src = " //www.bolfhxtuuhux.tw/hubfs/shutterstock_1779947102-LR.png " alt = "启用ICS安全性的最佳实践的力量,水,class="hs-feature -image" style=" font - family:宋体;max-width: 50%;浮:左;Margin:0 15px 15px 0;" >

In most parts of the world, power, water, and waste utility services can be taken for granted. Need to light up a room? Just flip a switch, and you have electricity. Hands need washing? Just turn the faucet, and there’s the water. Sink full of dirty water after scrubbing dishes? Just send it down the drain. No fuss, no hard labor.

It’s easy, right?

< div class = " hs-featured-image-wrapper " > < a href = " //www.bolfhxtuuhux.tw/blog/enabling-ics-security-best-practices-for-power-water-and-wastewater-utilities " title =“”class =“hs-featured-image-link”> < img src = " //www.bolfhxtuuhux.tw/hubfs/shutterstock_1779947102-LR.png " alt = "启用ICS安全性的最佳实践的力量,水,class="hs-feature -image" style=" font - family:宋体;max-width: 50%;浮:左;Margin:0 15px 15px 0;" >

In most parts of the world, power, water, and waste utility services can be taken for granted. Need to light up a room? Just flip a switch, and you have electricity. Hands need washing? Just turn the faucet, and there’s the water. Sink full of dirty water after scrubbing dishes? Just send it down the drain. No fuss, no hard labor.

It’s easy, right?

工业以太网 1月28日星期四13:00 GMT neil.wilkins@garlandtechnology.com(尼尔·威尔金斯) //www.bolfhxtuuhux.tw/blog/enabling-ics-security-best-practices-for-power-water-and-wastewater-utilities 2021 - 01 - 28 - t13:00:00z
OT网络将面临物联网中断 //www.bolfhxtuuhux.tw/blog/ot-networks-set-for-iot-disruption < div class = " hs-featured-image-wrapper " > < a href = " //www.bolfhxtuuhux.tw/blog/ot-networks-set-for-iot-disruption " title =“”class =“hs-featured-image-link”> < img src = " //www.bolfhxtuuhux.tw/hubfs/shutterstock_761907082-LR.png " alt = =“不为物联网网络破坏”类风格=“hs-featured-image宽度:汽车!重要;max-width: 50%;浮:左;Margin:0 15px 15px 0;" >

The pursuit of competitive advantage has always driven organizations to embrace new technologies and processes to reduce costs and improve efficiency. In the last several years, IoT has been commonly cited as the “next big thing” that will disrupt a range of industries like manufacturing, transportation, and logistics.

What many operators may not realize is that adoption of large volumes of IoT devices will occur in virtually every industry, not just a few. Simply put, the scope of change this adoption will demand in the IT and OT ecosystem is enormous. Starting with this article, I’ll be sharing information about this trend and how you, as an OT or IT professional, can help your organization navigate the IoT revolution.

< div class = " hs-featured-image-wrapper " > < a href = " //www.bolfhxtuuhux.tw/blog/ot-networks-set-for-iot-disruption " title =“”class =“hs-featured-image-link”> < img src = " //www.bolfhxtuuhux.tw/hubfs/shutterstock_761907082-LR.png " alt = =“不为物联网网络破坏”类风格=“hs-featured-image宽度:汽车!重要;max-width: 50%;浮:左;Margin:0 15px 15px 0;" >

The pursuit of competitive advantage has always driven organizations to embrace new technologies and processes to reduce costs and improve efficiency. In the last several years, IoT has been commonly cited as the “next big thing” that will disrupt a range of industries like manufacturing, transportation, and logistics.

What many operators may not realize is that adoption of large volumes of IoT devices will occur in virtually every industry, not just a few. Simply put, the scope of change this adoption will demand in the IT and OT ecosystem is enormous. Starting with this article, I’ll be sharing information about this trend and how you, as an OT or IT professional, can help your organization navigate the IoT revolution.

技术合作伙伴 工业以太网 格林尼治时间2021年1月21日周四13:00:00 //www.bolfhxtuuhux.tw/blog/ot-networks-set-for-iot-disruption 2021 - 01 - 21 t13:00:00z 帕特里克·贝德威尔
CISA的5年战略强调了对ICS可见性的需求 //www.bolfhxtuuhux.tw/blog/cisa-5-year-strategy-highlights-need-for-visibility-in-ics < div class = " hs-featured-image-wrapper " > < a href = " //www.bolfhxtuuhux.tw/blog/cisa-5-year-strategy-highlights-need-for-visibility-in-ics " title =“”class =“hs-featured-image-link”> < img src = " //www.bolfhxtuuhux.tw/hubfs/CISA-shutterstock_1454623841.png " alt =“网络安全关键基础设施”类=“hs-featured-image”风格= "宽度:汽车!重要;max-width: 50%;浮:左;Margin:0 15px 15px 0;" >

Revolutions have a habit of creating new problems that their advocates did not anticipate, and the Fourth Industrial Revolution is no exception. For example, it seems safe to say that most of the engineers who overhauled industrial control systems (ICS) by linking them to the internet did so with the aim of expanding and optimizing functionality, not with the intent of creating new avenues for industrial espionage. Likewise, the bookkeepers who approved the introduction of connected systems probably did so because they were looking to save money and increase efficiency, not because they hoped to facilitate the sabotage of critical infrastructure networks.

< div class = " hs-featured-image-wrapper " > < a href = " //www.bolfhxtuuhux.tw/blog/cisa-5-year-strategy-highlights-need-for-visibility-in-ics " title =“”class =“hs-featured-image-link”> < img src = " //www.bolfhxtuuhux.tw/hubfs/CISA-shutterstock_1454623841.png " alt =“网络安全关键基础设施”类=“hs-featured-image”风格= "宽度:汽车!重要;max-width: 50%;浮:左;Margin:0 15px 15px 0;" >

Revolutions have a habit of creating new problems that their advocates did not anticipate, and the Fourth Industrial Revolution is no exception. For example, it seems safe to say that most of the engineers who overhauled industrial control systems (ICS) by linking them to the internet did so with the aim of expanding and optimizing functionality, not with the intent of creating new avenues for industrial espionage. Likewise, the bookkeepers who approved the introduction of connected systems probably did so because they were looking to save money and increase efficiency, not because they hoped to facilitate the sabotage of critical infrastructure networks.

工业以太网 联邦 格林尼治时间2021年1月14日周四13:00:00 harry.berridge@garlandtechnology.com(哈利Berridge) //www.bolfhxtuuhux.tw/blog/cisa-5-year-strategy-highlights-need-for-visibility-in-ics 2021 - 01 - 14 t13:00:00z
2021年关键基础设施面临的2项基本挑战 //www.bolfhxtuuhux.tw/blog/2-fundamental-challenges-facing-critical-infrastructure-in-2021 < div class = " hs-featured-image-wrapper " > < a href = " //www.bolfhxtuuhux.tw/blog/2 -基础- - -关键基础设施面临的挑战- 2021”标题= "类=“hs-featured-image-link”> < img src = " //www.bolfhxtuuhux.tw/hubfs/critical-infrastructure.png " alt =“关键基础设施”class =“hs-featured-image”风格= "宽度:汽车!重要;max-width: 50%;浮:左;Margin:0 15px 15px 0;" >

With recent headline grabbing hacks and breaches, the possibility of disruptions in the energy and power, water distribution, manufacturing, and pharmaceutical infrastructure that society relies on everyday, is a reality.

The SolarWinds Orion compromise may have been headline grabbing to the wider public, but the teams in the trenches have long been aware of the vulnerabilities and have been working feverishly to shore up the defenses.

The US government, through the Cybersecurity and Infrastructure Security Agency (CISA) has implemented a 5 year strategy “Securing Industrial Control Systems: A Unified Initiative FY 2019–2023” to address these challenges. And the Network and Information Security Directive (NISD) was recently passed in the EU, requiring critical infrastructure organizations to implement stronger cybersecurity and breach reporting for ICS, SCADA and OT networks.

< div class = " hs-featured-image-wrapper " > < a href = " //www.bolfhxtuuhux.tw/blog/2 -基础- - -关键基础设施面临的挑战- 2021”标题= "类=“hs-featured-image-link”> < img src = " //www.bolfhxtuuhux.tw/hubfs/critical-infrastructure.png " alt =“关键基础设施”class =“hs-featured-image”风格= "宽度:汽车!重要;max-width: 50%;浮:左;Margin:0 15px 15px 0;" >

With recent headline grabbing hacks and breaches, the possibility of disruptions in the energy and power, water distribution, manufacturing, and pharmaceutical infrastructure that society relies on everyday, is a reality.

The SolarWinds Orion compromise may have been headline grabbing to the wider public, but the teams in the trenches have long been aware of the vulnerabilities and have been working feverishly to shore up the defenses.

The US government, through the Cybersecurity and Infrastructure Security Agency (CISA) has implemented a 5 year strategy “Securing Industrial Control Systems: A Unified Initiative FY 2019–2023” to address these challenges. And the Network and Information Security Directive (NISD) was recently passed in the EU, requiring critical infrastructure organizations to implement stronger cybersecurity and breach reporting for ICS, SCADA and OT networks.

工业以太网 1月7日星期四13:00:00 GMT chris.bihary@garlandtechnology.com (Chris Bihary) //www.bolfhxtuuhux.tw/blog/2-fundamental-challenges-facing-critical-infrastructure-in-2021 2021 - 01 - 07 - t13:00:00z