Blog

 

Open Source Software Exposes ICS Device Vulnerabilities to Hackers

Open Source Software Exposes ICS Device Vulnerabilities to Hackers

It’s disturbing to think that disruption and damage to our critical infrastructure can happen by simply combining the use of OSS tools with malicious intent. Fortunately, those same tools are being used by ICS security researchers around the world to increase industrial control systems cyber security.

Read on to learn why transportation, communications, energy and emergency services are so exposed, and what’s being done to close the ICS cyber security gap.

read more
Black Hat: Understanding TRITON, The First SIS Cyber Attack

Black Hat: Understanding TRITON, The First SIS Cyber Attack

Today at Black Hat USA I am part of a team speaking about the landmark TRITON malware attack. We are presenting new research on TRITON, releasing two tools to help defend against it and publishing a white paper summarizing our findings.

The TRITON malware attack went beyond other industrial cyber attacks by directly interacting with a Safety Instrumented System (SIS). Asset owners should act immediately to secure their SIS — and the information in our white paper will help.

read more
Electric Grid Cyber Security: Ten Actions Utilities Can Do Now

Electric Grid Cyber Security: Ten Actions Utilities Can Do Now

Concerns about cyber attacks on the U.S. critical infrastructure have reached a new level with The Wall Street Journal reporting “an evolution in the U.S. government’s thinking about how to deter malicious cyberactors”.

Find out ten actions that can be done quickly to monitor and secure the electrical grid against determined threat actors.

read more
SCADA Cyber Security for an Industry 4.0 Oil and Gas Application

SCADA Cyber Security for an Industry 4.0 Oil and Gas Application

If you’re boots-on-the-ground dealing with the daily oil and gas challenges of control and automation, you’ve likely heard lots about Industry 4.0, the fourth wave of industrial revolution. Given the inter-connection between more and more devices and commercially marketed systems, the cyber security challenges of this phase of automation are daunting.

To overcome these hurdles, let’s examine how an application that’s been around for a long time – hosted SCADA, can be monitored for cyber security, data integrity and reliability.

read more
Russian Cyber Attacks on Critical Infrastructure: The “New Normal”

Russian Cyber Attacks on Critical Infrastructure: The “New Normal”

Concerns about Russian cyber attacks on U.S. electric utilities have increased again this week. The Wall Street Journal is reporting that such attacks have impacted hundreds of victims, not just the dozens reported earlier.

This news brings a new wave of concern about cyber attacks across the U.S. and beyond. If you are involved in this discussion, following is a recap of what is known about the Russian cyber attacks and my thoughts on its significance and repercussions.

read more
New TRITON Analysis Tool: Wireshark Dissector for TriStation Protocol

New TRITON Analysis Tool: Wireshark Dissector for TriStation Protocol

In 2017, TRITON malware was used to attack a gas facility, directly interacting with its Safety Instrumented System (SIS). Given the significance of this attack, Nozomi Networks conducted research to better understand how TRITON works.

Today we released a Wireshark dissector for the TriStation protocol on GitHub to help the ICS community understand SIS communications. Our complete TRITON analysis will be presented at Black Hat USA 2018.

read more
Why Business Leaders Need to Focus on Industrial Cyber Security

Why Business Leaders Need to Focus on Industrial Cyber Security

Today’s business leaders are expected to manage risk for their entire organization – from enterprise IT systems to OT environments. With IT and OT systems becoming more connected, and cyberattacks on industry rising, managing risk means shifting focus to industrial cyber security.
Two of the most important measures to take are bringing together IT and OT teams and investing in new technology that improves the visibility and cyber resiliency of industrial networks.

read more
Nozomi Networks Scales Globally to Deliver Advanced ICS Cyber Security

Nozomi Networks Scales Globally to Deliver Advanced ICS Cyber Security

The demand for industrial IT/OT solutions is growing rapidly and to meet it our company has just released a new version of our product suite which delivers significant enhancements. We have also broadened our partner ecosystem and expanded our global presence.

Read on to learn how those responsible for large, distributed installations can better manage escalating threats with our 4th generation ICS cyber security and operational visibility solution.

read more
Managing OT Risk While Protecting Your Organization’s Reputation

Managing OT Risk While Protecting Your Organization’s Reputation

Cyber threats can damage your critical OT infrastructure – and your reputation. The Nozomi Networks solution improves cyber resiliency and operational reliability. Standing Partnership’s reputation management advice helps you manage the risk that comes with an attack.

Combining crisis preparedness with advanced cyber security technology will leave you well equipped to protect your OT network – and your reputation, when a cyber incident happens.

read more