Highly Secure in Non-Secure Networks With OPC UA
How do IT security experts evaluate the networking of plants and machinery with OPC UA? And is OPC UA also suitable for critical infrastructures and sensitive plant segments? Steve Schoner, Product Marketing Manager, and Markus Maier, Product Owner for Industrial Products at the IT-security company genua, explain in an expert interview how industry can resolve the conflict between networking and security.
An Industrial Data Diode for Especially Critical Plants and Processes
For monitoring or for process optimization, well-isolated production plants also need to be digitally networked. For specially critical plants, a direct connection is, however, extremely problematic. Security concerns therefore frequently outweigh the automation advantages. cyber-diode from genua represents a highly secure and suitable technology for current automation requirements.
Anomaly Detection Protects Internal Data Traffic
High reliability during operation and cost savings in service and support: The remote maintenance of SAP systems provides considerable user benefits. However, risks need to be avoided during remote access by external experts and a very high level of protection must be ensured. A remote maintenance solution developed by genua together with SAP identifies new possibilities. It transfers a remote maintenance concept from the industrial sector to the SAP world.
IT Security Solutions From genua Withstand Attacks With Quantum Computers
Already six years ago, genua began to work together with the Technical University (TU) of Darmstadt on preparing the XMSS digital signature scheme for market. In 2017, the scheme was finally released as the first Internet standard for post-quantum signatures.
IT Security: Artificial Intelligence as Digital Trainee
To err is human, especially in highly complex jobs such as software programming. And not every careless mistake in a line of code immediately results in a safety-relevant problem. But: Who checks and decides that in IT security teams, which, with their limited resources, need to concentrate on other priorities?
The Goal is Crypto-Agility
In just a few years, quantum computers could be ready for practical use. This is a risk scenario that must be taken seriously when considering current cryptographic methods. The effective protection of digital infrastructures against the advanced computing capabilities of quantum chips is only possible if IT security keeps pace with this development.
Security Defined Networking for Flexible and Highly Secure IT
New challenges call for new approaches. At present, for example, digitization requires an extensive restructuring of many business processes. IT departments are expected to flexibly support this dynamic development with the necessary applications. But that’s just one side of the story. On the other side, growing cyber threats demand additional security measures. In the past, increased IT security often came at the expense of flexibility in IT operations, however.
Artificial Intelligence Training for Cyberwar
This was another busy year for businesses in the arms race against cybercriminals: According to the German Federal Office for Information Security, around 320,000 new malware items entered circulation between June 2018 and May 2019 alone – per day. This increases the pressure to establish an IT security infrastructure that can also keep up with the spectrum of future threats.
RTL2: High Performance Requirements for VPN Systems
Do media companies place special requirements on IT security? And what are the current challenges? RTL2 is one of genua's long-standing customers – an interview with Reinhard Görtner, Head of IT & CIO, RTL2 Fernsehen GmbH & CO. KG.
New QuaSiModO Research Project Launched
In the QuaSiModO (Quantum-Safe VPN Modules and Operation Modes) research project, new quantum-resistant algorithms are being investigated, tested and implemented in VPN standards and VPN implementations. genua is the project coordinator and is represented in the project by Stefan-Lukas Gazdag. In the interview below, the cryptography expert answers questions about the research content.