A water trade association, at a congressional hearing Tuesday, urged the federal government to institute minimum cybersecurity standards for water systems. This comes as water providers see a big increase in the risk they face by connecting their legacy machines to the internet.
Every connected device is now considered a part of the Extended Internet of Things (XIoT). When securing XIoT devices that connect to networks, it can be hard to account for all the nuances required to secure them. What simplifies the process of delivering contextually aware threat detection and recommendations is an...
Integrating operational technology (OT) threat monitoring into security operations centers (SOCs) contributes greatly to achieving fast, comprehensive threat detection and response.
Download this Executive Brief now to look at the:
trends behind combined IT/OT SOCs.
Key steps to include industrial threat...
Despite renewed focus on the part of law enforcement, government bodies, and industry, the sophistication of the cyber-attack technology and risk to organizations continues to trend in the wrong direction.
Nozomi Networks Labs continues to aggregate industry trends and its own research in this semi-annual report...
The OT cybersecurity landscape has changed significantly in the past two years. We have seen significant attention and overall growth of investment in securing our critical ICS/OT systems, but we still need some progress in key areas.
This SANS OT/ICS Cybersecurity Survey explores how OT defenders across all...
Adversary strategies have evolved from simple malware distribution to a broad set of automated, targeted, and sophisticated attacks that can bypass traditional endpoint protection. This has forced manufacturers to deploy multiple products from different vendors to protect against, detect, and respond to these threats....
"All too often we hear that our industrial control systems have no security. That's not true," says Kevin Jones, group CISO of Airbus. In fact, he states, "some of these systems have been designed with security encapsulating them and security around them." He discusses enhancing cyber resilience.
How can enterprises ensure that their IT and OT teams work together on security? Two experts from Rockwell Automation share their thoughts in this eBook.
"We brought IT, plant engineers, plant managers and security teams together in a room for a week, and we had a workshop. We used the NIST Cybersecurity...
The security world continues its fight against potential widespread exploitation of the critical remote code execution vulnerability - tracked as CVE-2021-44229 - in Apache's Log4j software library, versions 2.0-beta9 to 2.14.1, known as "Log4Shell" and "Logjam." This is a digest of ISMG's updates.
Cybersecurity experts worry about attacks and ransomware directed at the 70,000 water and wastewater facilities in the U.S. In November 2020, the Hampton Roads Sanitation District was infected with Ryuk ransomware. Fortunately, its operational technology systems were unaffected, and it recovered.
There is a safer and potentially more profitable way to
conduct business along the manufacturing enterprise –
and the funny thing is it has been here all the time.
By applying API RP 754 and extending it with edge
analytics, it is possible for manufacturers to create a process safety
management dashboard...
Digital transformation is well established in the business IT space, but it’s a different story for industrial process
control. Because reliability and safety are so critical to industries like oil and gas, these industries are more
cautious about adopting the newest technologies.
But what are the best ways to...
Securing operational technology (OT) systems for critical
infrastructure requires identifying and tracking a complete inventory
of all OT and IT endpoints. Only with a comprehensive inventory
that includes configuration data can companies protect against
unauthorized change, achieve compliance, mitigate risk...
CISOs need to be open to ideas and suggestions from their peers and other functions and exhibit thought leadership to establish collective defense thinking in fighting threats, says Steven Sim Kok Leong, president of ISACA, Singapore chapter and chair of OT-ISAC Executive Committee.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.