Solar Power Systems are Dangerously Vulnerable to Attack

Cybersecurity is an afterthought for solar power, according to Forescout Research. But the implications for energy and national security are staggering. The main culprit—connected solar inverters—are visible on the public Internet via their IP
addresses. They can be found by even amateur hackers.

Former GE CIO raises the alarm on legacy platforms and unsecure IoT

Up to 50% of American manufacturers report running their mission-critical applications on legacy infrastructure. No wonder 2023 saw a 50% increase in ransomware, 70% of which affected manufacturers.

Listen to Thomas Martin, former Industrials CIO at General Electric and current President and Founder of NephoSec Cloud Security, as he highlights concerns about this destructive combination and discusses how net-net technology from Isolated Networks can help.

How to Leapfrog the Risk of Legacy Platforms in Manufacturing

Our many thanks to Thomas Martin, Founder & CEO at NephoSec Cloud Security, and Chris Filandro, SVP & CDO at Affinity for joining Isolated Networks CEO Mark Feil to discuss the game-changing impact Isolated Networks technology will have on securing connected IoT devices and legacy hardware in the cloud and on prem.

Got a Firewall for Every Vulnerability on the Factory Floor? Fat Chance.

Let’s get real. Legacy networking models attempt to partition and secure systems but are unable to create a closed network.  In today’s world of legacy infrastructure and connected factory-floor devices, we are simply partitioning devices and using perimeter defenses. In other words, your IoT/OT systems are open to the public Internet.