BLOG

Industrial Cyber Security Blog

Recent Posts

Perspectives: Early Lead in Filling Global OT Security Demand

Earlier this year when we declared 2019 the Year of ICS Cyber Security, we underestimated just how quickly the market would grow. OT security is without a doubt a top priority for businesses worldwide; and buyers are demanding IT/OT converged solutions.

Read on to find out why Nozomi Networks has secured a strong early lead in fulfilling the global demand for effective industrial security.

URGENT/11 – New ICS Threat Signatures by Nozomi Networks Labs

A well-known RTOS (Real-Time Operating System), widely used in industrial sectors, is at risk from a series of 11 vulnerabilities dubbed URGENT/11.

Nozomi Networks Labs conducted research on the vulnerable devices and has released threat signatures for URGENT/11 that identify threats in typical industrial networks without generating high numbers of false positive alerts.

Speeding IT Visibility into OT: New Integrations with Fortinet

Fortinet and Nozomi Networks achieve another partnership milestone with two new integrations that help eliminate the gap between IT and OT. Now Nozomi Networks Guardian is now comprehensively integrated with FortiGate, FortiNAC, and FortiSIEM.

Learn how these integrations deliver full visibility across IT and OT environments, improve access control and speed incident response.

Recent Labs Posts

URGENT/11 – New ICS Threat Signatures by Nozomi Networks Labs

A well-known RTOS (Real-Time Operating System), widely used in industrial sectors, is at risk from a series of 11 vulnerabilities dubbed URGENT/11.

Nozomi Networks Labs conducted research on the vulnerable devices and has released threat signatures for URGENT/11 that identify threats in typical industrial networks without generating high numbers of false positive alerts.

An ICS Cyber Security Storm is Brewing: How to Prevent Staff Burnout

Building cyber resiliency puts a lot of pressure on an organization’s security team. It requires specialized knowledge that takes time to develop, and there just aren’t enough skilled cyber experts to go around.

Which begs the question: are the limited number of security experts holding the front lines in danger of burnout – and what can we do about it?