When I started Tofino Security in 2006, my two goals were to make industrial cyber security easy to deploy and better suited for the real needs of mission critical networks. Our first generation products went a long way in doing that, but like any initial offerings they reflected a limited feedback loop from users in the field.
Today I am proud to say that we have integrated lessons learned over the last eight years to deliver Tofino 2.0, our next generation of industrial cyber security solutions.
Everybody these days seems to be talking about software defined networking (SDN) and what it means for the future of data centers.
While giants like Google and Amazon are already using some form of SDN, others are just starting to experiment with the technology. While there’s no doubt that SDN will eventually make its way from larger hyperscale data centers and cloud service providers to the enterprise, I believe we are still at least a year away from any significant adoption.
While you might not be ready for SDN today, getting a handle on the benefits and considerations can help prepare you for the inevitable. What Is It?
Editor's Note: This week we have a post from a guest blogger! Greg Deitz is a networking cable product manager for Belden.
Last month, Paul Kish blogged about counterfeit cable and connectivity, the risks and how to identify these subpar components. As stated in that blog, purchasing well-known brands of cable and connectivity from reputable manufacturers like us is the best protection against counterfeit components.
Purchasing Belden cable is also the best protection against copper clad aluminum (CCA) cables, which unfortunately have become a growing problem in the market.
Texans have a well-earned reputation for being some of the friendliest and most welcoming folks in the country. So as a Texan let me extend a big Texas-size welcome and invite you to attend this year’s Industrial Ethernet Infrastructure Design Seminar to be held in Houston Sept. 21-24.
The seminar is all about learning practical, no-nonsense, “I can use this immediately when I get back on the job” tips to improve your Ethernet network design skills.
Read on to find out about the overall seminar and then I’ll provide a few words about a new part of the seminar dedicated to what Houston is known for—oil and gas.
Ninety years ago, the Ottoman empire ended. What’s now known as IBM was formed. Walt Disney created his first cartoon, “Alice’s Wonderland.” It was the first ever Macy’s Thanksgiving Day parade. The first Winter Olympic Games were held in the French Alps.
All of these things have had had a lasting effect on our culture, but our vote for most interesting and exciting event from 1924 was the formation of Hirschmann. Ninety years of reliable and unsurpassed quality. What an accomplishment!
Hirschmann has made many contributions to the world of industrial networking, including pioneering the development and use of Ethernet as a standard for industrial control systems.
Our friends from around the world took a moment to congratulate Hirschmann on all its success over the last 90 years.
Supported by both TIA commercial and data center standards, fiber zone cabling has been around for a while as a viable means for improving manageability, flexibility, scalability and security in a variety of applications—from the casino floor to the data center.
Let’s take another look at the practice of fiber zone cabling and its benefits, applications and considerations.
Time to Pay Attention to the NIST Guide to ICS Security
About 6 months ago I wrote an article for this blog about the NIST Cybersecurity Framework. The article described how the framework came to be, what it is, what it is supposed to do and what you should do about it.
If you have any interest in industrial cyber security you will want to download the latest version of the framework and have it on hand for reference. If you are in a critical infrastructure industry your organization needs to go one step further and become familiar with its content.
In this article I am going to discuss the newly revised ICS Security Guideline – NIST 800-82 Rev. 2 – and offer some useful thoughts on it.