{"id":12192,"date":"2018-05-03T10:00:01","date_gmt":"2018-05-03T18:00:01","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/05\/03\/news-5961\/"},"modified":"2018-05-03T10:00:01","modified_gmt":"2018-05-03T18:00:01","slug":"news-5961","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/05\/03\/news-5961\/","title":{"rendered":"Securing the Connected Industrial World with Trend Micro"},"content":{"rendered":"<p><strong>Credit to Author: Eva Chen| Date: Thu, 03 May 2018 16:24:23 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"166\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/hm18-h17-28-1547287.original_image_gallery_desktop-300x166.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/hm18-h17-28-1547287.original_image_gallery_desktop-300x166.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/hm18-h17-28-1547287.original_image_gallery_desktop-768x425.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/hm18-h17-28-1547287.original_image_gallery_desktop-640x354.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/hm18-h17-28-1547287.original_image_gallery_desktop-440x243.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/hm18-h17-28-1547287.original_image_gallery_desktop-380x210.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/hm18-h17-28-1547287.original_image_gallery_desktop.jpg 868w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>At Trend Micro we\u2019ve made it our business over the past 30 years to anticipate where technology is taking the world. That\u2019s why our message has evolved over that time from <em>Peace of Mind Computing<\/em> to <em>Your Internet Firewall<\/em> and most recently <em>Securing Your Journey to the Cloud<\/em>. Well, we know that things are evolving again, as the Internet of Things drives an evolution in IT infrastructure, user behavior and cyber-threats. That\u2019s why it was great to take our new message<em> Securing the Connected World <\/em>to an audience of Industry 4.0 experts at Hannover Messe last week.<\/p>\n<p>As \u201cthe world&#8217;s leading Trade Fair for industrial Technology\u201d read more <a href=\"http:\/\/www.hannovermesse.de\/home\">here about Hannover Messe<\/a>.<\/p>\n<p>If we want this next industrial revolution to be a success, we need to bake cybersecurity in from the start, and that\u2019s going to require a whole new way of doing things.<\/p>\n<p><strong>The insecure connected world<\/strong><\/p>\n<p>Trend Micro has managed to stay relevant over the past three decades because in many ways our formula for success hasn\u2019t changed. We anticipate shifts in IT infrastructure, embrace changes in user behavior and adapt protection for the new threats we encounter. Driving this change is the Internet of Things. According <a href=\"https:\/\/www.idc.com\/infographics\/IoT\">to some analysts<\/a> there are as many as 128 billion connected things in the world today. To put that in perspective, that\u2019s nearly twice the population of the planet \u2013 a staggering number. And it\u2019s growing all the time: <a href=\"https:\/\/community.arm.com\/iot\/b\/blog\/posts\/white-paper-the-route-to-a-trillion-devices\">Arm predicts<\/a> it will reach one trillion by 2035.<\/p>\n<p>IoT technology is already permeating every corner of the industrial world to make companies more cost effective, productive and agile. It\u2019s no surprise the market for IIoT <a href=\"https:\/\/www.grandviewresearch.com\/press-release\/global-industrial-internet-of-things-iiot-market\">is set to be worth<\/a> $934bn by 2025. But as organizations invest more and more heavily in IIoT technologies and processes, they threaten to expose themselves to greater cyber-risk. Ransomware is actively targeting network infrastructure and industrial equipment, while IoT endpoints could be hijacked to remotely control or sabotage industrial machinery. Attacks can also compromise poorly protected IoT devices and use them to launch DDoS attacks or serve as proxies for other raids.<\/p>\n<p>The threat will only get more pronounced as the bad guys use machine learning and cryptography in a bid to escape detection. So how do industrial stakeholders respond to this new cyber-threat?<\/p>\n<p><strong>A new approach<\/strong><\/p>\n<p>We can\u2019t simply try to fit existing cybersecurity approaches into this new world. For one thing, the IoT is much different from traditional IT environments. We\u2019re not just dealing with TCP\/IP traffic, there are a huge number of new protocols to get to grips with. Then there\u2019s the sheer volume of endpoints to consider, and the associated traffic. They connect not through a traditional gateway but directly, which requires a new kind of security at the network edge. Then there\u2019s the problem of IT skills: they\u2019re already in increasingly short supply and will need to adapt further to take account of the growing convergence of IT and OT worlds.<\/p>\n<p>This is particularly apparent in manufacturing and Industry 4.0 environments. Enterprises will therefore need a new mentality and architectural approach to succeed in this brave new world. Next Generation Security Operations Centers will be a must-have: overcoming traditional challenges of alert fatigue, poor visibility, and slow response times. Trend Micro\u2019s answer is to use AI to prioritize alerts, automate the correlation of threats across layers in an optimized fashion, and tightly orchestrate a connected response across IT and OT.<\/p>\n<p><strong>At the show<\/strong><\/p>\n<p>It was great to talk to so many experts from the industrial and manufacturing sectors, at Hannover Messe last week. These are the guys at the frontline when it comes to cyber-threats. Given the repercussions of a successful attack, the stakes don\u2019t come much higher than here. That\u2019s why we were keen to demonstrate on stand how cyber-attackers could disrupt a smart factory, causing physical damage on the production line or a ransomware outage spread from office computers.<\/p>\n<p>It was also important to reach out at the show because, ultimately, the only way we\u2019re going to stay one step ahead of the bad guys is by working closely together. That\u2019s why Trend Micro is collaborating closely with ISPs on Virtual Network Function-based security; with industry to research and gather intelligence on new vulnerabilities; with embedded computing developers on innovative new solutions; and with enterprise customers.<\/p>\n<p>Because only with effective cybersecurity can we accelerate the development of our connected world.<\/p>\n<p>To find out more on these themes, please take a look at my <a href=\"https:\/\/www.tvonweb.de\/kunden\/hm2018\/trendmicro\/\">presentation at Hannover Messe<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/securing-the-connected-industrial-world-with-trend-micro\/\">Securing the Connected Industrial World with Trend Micro<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/securing-the-connected-industrial-world-with-trend-micro\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Eva Chen| Date: Thu, 03 May 2018 16:24:23 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"166\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/hm18-h17-28-1547287.original_image_gallery_desktop-300x166.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/hm18-h17-28-1547287.original_image_gallery_desktop-300x166.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/hm18-h17-28-1547287.original_image_gallery_desktop-768x425.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/hm18-h17-28-1547287.original_image_gallery_desktop-640x354.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/hm18-h17-28-1547287.original_image_gallery_desktop-440x243.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/hm18-h17-28-1547287.original_image_gallery_desktop-380x210.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/05\/hm18-h17-28-1547287.original_image_gallery_desktop.jpg 868w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>At Trend Micro we\u2019ve made it our business over the past 30 years to anticipate where technology is taking the world. That\u2019s why our message has evolved over that time from Peace of Mind Computing to Your Internet Firewall and most recently Securing Your Journey to the Cloud. Well, we know that things are evolving&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/securing-the-connected-industrial-world-with-trend-micro\/\">Securing the Connected Industrial World with Trend Micro<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[1001,18292,18293,18294,12512,6269,10495,714],"class_list":["post-12192","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-business","tag-connected-world","tag-endpoints","tag-hannover-messe","tag-iiot","tag-internet-of-things","tag-iot","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12192"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12192\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12192"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}