Industrial Cyber Security Blog
The mining industry is embracing digital transformation, but it comes at a cost: an increasingly connected operating environment exponentially expands the threat surface. This makes mining operations more vulnerable to cyber threats, and more difficult to protect against attacks.
Read on to learn about the three most common cyber threats facing the mining industry – and steps operators should take to deflect potential attacks.
The manufacturing environment is changing fast. Digital transformation promises substantial increases in productivity, speed and quality. Securing modern manufacturing is essential to safety and uptime.
Fortunately, guidelines such as the NIST Cybersecurity Framework for Manufacturing and IEC 62443, along with advanced visibility and cyber security solutions, can help manufacturers build resiliency fast. Read on to learn how.
Earlier this year when we declared 2019 the Year of ICS Cyber Security, we underestimated just how quickly the market would grow. OT security is without a doubt a top priority for businesses worldwide; and buyers are demanding IT/OT converged solutions.
Read on to find out why Nozomi Networks has secured a strong early lead in fulfilling the global demand for effective industrial security.
Recent Labs Posts
A well-known RTOS (Real-Time Operating System), widely used in industrial sectors, is at risk from a series of 11 vulnerabilities dubbed URGENT/11.
Nozomi Networks Labs conducted research on the vulnerable devices and has released threat signatures for URGENT/11 that identify threats in typical industrial networks without generating high numbers of false positive alerts.
On August 13, 2019, the Siemens CERT Team issued an advisory (SSA-100232) concerning Siemens SCALANCE switch devices. This vulnerability was responsibly disclosed to Siemens CERT Team and CISA by Nozomi Networks Labs.
Learn more about our findings and gain a better understanding of the cyber risks of legacy devices.
Today at Black Hat USA we’re presenting an innovative power grid cyber security solution that greatly improves monitoring of intelligent electronic devices (IEDs).
Using the IEC 62351 standard for monitoring industrial networks, we demonstrate how four types of hard-to-detect attacks are readily identified.