Check out the 12 days of cybersecurity mini-series!
While it's always useful to read the latest coverage about a topic like cybersecurity, no single article can be more than a snapshot about what's happening right now. Looking back over previous coverage and articles can show how its players, priorities and capabilities have evolved over time. For example, while passwords and network segmentation used to be the most important, network monitoring has grown ever more crucial, and matured to embrace anomaly detection on more levels. Here are some of Control's recent cybersecurity articles:
- Common-sense cybersecurity in the age of IoT—build on tried-and-true methods with protections enabled by cloud computing and other digitalized solutions
- You can be a cybersecurity badass—users, system integrators and suppliers are striking back on cybersecurity intrusions and attacks by sharing best practices, tools and services like never before—Part 1 and Part 2
- Building a united front for cybersecurity—process security demands constant vigilance, but it also requires all parties to look out for each other and share best practices for effective protection
- Why cybersecurity can't be overlooked—effective cybersecurity requires ceaseless monitoring and evaluation of network data and traffic to identify and head off evolving intrusions and potential attacks, but improved tools are making it simpler and easier
- Cybersecurity: what's in your armor?—cybersecurity begins with firewalls and network segmentation, but these barriers must be accompanied by constant monitoring and verification of internal communications and data to protect applications
- First aid for process security—viruses and cyber attacks are looming. Help From governments and standards is lacking. Some engineers and managers are fighting to protect their applications and companies. Here's how they do it
About the author: Jim Montague