Category: Manufacturing & Industry 4.0

KMS: The Key to Secure Management of Cryptographic Objects 

This article is intended primarily for an informed public, mastering the use of cryptographic keys in an IS and their management in organizations.  Increasing security requirements for both industrial environments and connected objects have led to a profusion of cryptographic…

IEC 62351 Standard: What cybersecurity measures are suitable for electrical networks? 

IEC 62351 is an international cybersecurity standard for Smart Grid communication and control systems. Its aim is to help grid operators protect themselves against threats endangering this sector, while adapting the recommendations to the realities of the industrial world.   In…

PLC network: the history of industrial systems  facing up to the challenges of the future

Introduction Industrial systems are a category of information systems of their own, with codes and properties that differ from "classic" IT systems. It is well known that the level of maturity of the industrial sector in terms of cybersecurity is…

IT for OT: What process to develop cybersecurity solutions adapted to industrial businesses?

During the Wavestone OT Cyber Day, Loïc Lebain and Benoit Bouffard conducted a workshop in which they noted that IT departments were still struggling to develop a catalogue of cybersecurity solutions for OT. Based on their experience with our customers,…

Application control: what strategy you should adopt for your industrial supervision system?

The industrial control system (ICS) is the set of resources and machines used to supervise and control an industrial process. This article looks at the security issues surrounding Windows devices of the ICS supervision and maintenance layer: SCADA servers and…

Energy sector: A cybersecurity obligation in the face of attacks to ensure the provision of essential services

Cyber issues in the energy sector The energy sector is made up of vital infrastructures and provides essential services for a country. The sector, shaped by increasing digitalization, is undoubtedly a prime target for cyber attackers with consequences that are liable…

Back to top