To subscribe, advertise or contribute articles to smartmanufacturingtoday.com contact publisher@xtra.co.nz

  • Home
  • Newswire
  • Contact us
  • Advertise
  • Subscribe
  • About
Smart Manufacturing Today
Your source of info
  • Home
  • Additive Manufacturing
  • AI
  • Big Data
  • Business
  • The Circular Economy
  • Computer Integrated Manufacturing
  • Developments
  • Events
  • Featured
  • Future Technologies
  • Internet of Things
  • Latest News
  • Manufacturing Software
  • Manufacturing Technology
  • Product Design
  • Robotics
  • PLM & CAD/CAM
  • Profiles
  • Supply Chain
  • Sustainability
  • The Creative Class
  • Workshop Tools

News Ticker

Smarter growth, lower risk: Rethinking how new factories are built
  Countries successfully growing their manufacturing – and what they are doing right
BW Converting launches e-learning platform for enhanced customer training
Manufacturing and Production Industry is Fighting a 41% Increase in Ransomware Attacks over Four Years
CT Semiconductor Inaugurates ATP Chip Semiconductor Training Center
Energy Experts on AI Tools for Building’s Sustainability:“Triple Win for Businesses, People, and Planet”
FactoryTalk DataMosaix puts data at the centre
How leveraging smart factories optimises products and operations for manufacturers

Taking steps to protect connected industrial infrastructure

By: Gavin Coulthard, Systems Engineering Manager for Australia and New Zealand, Palo Alto Networks

Networked devices and computer-controlled machines are nothing new in the manufacturing industry, but the rise of the Internet of Things (IoT) is seeing an unprecedented number of devices connected to the internet for monitoring and control purposes.

There are applications for IoT devices in almost every industry, and the manufacturing sector has much to gain from this technology. In many ways, the industrial control and automation systems commonly used in manufacturing processes have, for a long time, acted as precursors to the connected devices that are now available to consumers.

However, today’s development of IoT technology delivers new capabilities for businesses as well as individuals. These connected devices and systems can offer better management of industrial control systems (ICS).
IoT technology supports a granular quality of control and monitoring data, which can benefit supervisory control and data acquisition (SCADA) systems or distributed control systems and, in fact, any industrial automation system.

We’re talking about large volumes of sometimes very complex data. When used well, IoT technology provides an extremely useful tool.

While these new capabilities can lend enormous value to manufacturers, they also come with new problems. First among these is the issue of information security.

Mixing operational technology systems and information technology systems by way of IoT devices increases an organisation’s threat surface and opens up new ways for hackers to breach sensitive organisational networks.

In some organisations, this can result in data and financial losses. But for manufacturers, it can lead to infrastructure and reputational damage, and even open up the possibility of personal harm to workers.

In 2010, for example, centrifuges at Iran’s Natanz nuclear facility failed due to malware called Stuxnet. Now considered a cyber weapon, Stuxnet has since been followed by other classes of malware and attack methodologies specifically design to disrupt physical industrial infrastructure.

Today, industrial control systems are a growing target for cyberattack and, as the threat landscape becomes more aggressive, more industrial systems are being networked. This means manufacturers are more open than ever to potential threats.

However, there are things manufacturers can do to minimise their risks. Here are five key steps to protecting industrial IoT infrastructure:

1. Implement Layer 7 inspection technologies for improved visibility
Granular visibility of ICS protocols is a helpful step to increasing intelligence regarding data traffic. Linking this visibility to users and inspecting file-bearing applications is an essential part of this process. Next-generation firewalls employing advanced deep-packet inspection technology can help to deliver this capability.

2. Apply zero-trust network segmentation
It is important to apply zero-trust rules with access allowed on a ‘least privilege’ basis, where users are given access only to the systems they need to carry out their duties. This approach can result in a marked reduction in the number of vectors that can be used by an attacker, while also providing better correlation between user and application.

3. Use modern tools for preventing zero-day attacks
So-called zero-day attacks exploit previously unknown vulnerabilities in computer code to breach systems. Tools that can detect and prevent such threats at both the network and the endpoint levels are now essential for protection. A combination of malware ‘sandboxing’ solutions and advanced endpoint protection technology can help reduce the success of such attacks.

4. Secure mobile and virtual environments
Mobile devices should be checked for proper configuration before being allowed to access the network and, once on the network, applications should be limited to reduce the potential attack vectors. For virtual environments, virtualised firewall technology should be used to provide better visibility to data traffic.

5. Use a cohesive security platform
Many legacy ICS environments don’t have adequate security, and those that do often use security systems with point solution architecture. This can hamper performance, incident response, and administration. Next-generation firewall architecture, on the other hand, along with new models of centrally-connected endpoint security measures, support optimal operation and threat detection.

Share this:

Related Posts

AMA gets PIC

Featured /

Your company’s visionaries are wrong about the Internet of Things

Jessica-Cheam-532x600

Manufacturing Technology /

Trillions to be unlocked in sustainable investment opportunities in Asia 

Digital twin PIC

Featured /

Digital Twins a catalyst to fulfilling sustainability agenda

‹ Five steps to protecting Industrial Internet of Things infrastructure› Solid Edge ST9 software provides new cloud capabilities

18th May 2025

Recent Posts

  • Open source technology in the age of AI
  • Trillions to be unlocked in sustainable investment opportunities in Asia 
  • Trump’s tariff: A test to Malaysia’s trade resilience
  • Smarter growth, lower risk: Rethinking how new factories are built
  • Zenno Astronautics and ANA Trading rollout superconducting space technologies in Japan

Categories

  • 3D Printing
  • Additive Manufacturing
  • AI
  • Big Data
  • Business
  • Computer Integrated Manufacturing
  • Developments
  • Events
  • Featured
  • Future Technologies
  • Internet of Things
  • Latest News
  • Manufacturing Software
  • Manufacturing Technology
  • PLM & CAD/CAM
  • Product Design
  • Robotics
  • Supply Chain
  • Sustainability
  • The Circular Economy
  • The Creative Class
  • Uncategorized
  • Workshop Tools

Back to Top

  • Home
  • Additive Manufacturing
  • AI
  • Big Data
  • Business
  • The Circular Economy
  • Computer Integrated Manufacturing
  • Developments
  • Events
  • Featured
  • Future Technologies
  • Internet of Things
  • Latest News
  • Manufacturing Software
  • Manufacturing Technology
  • Product Design
  • Robotics
  • PLM & CAD/CAM
  • Profiles
  • Supply Chain
  • Sustainability
  • The Creative Class
  • Workshop Tools

To subscribe, advertise or contribute articles to smartmanufacturingtoday.com contact publisher@xtra.co.nz

(c) Smart Manufacturing Today, 2025