Increasing ICS connectivity is exposing industrial networks to new operational risks and cyber threats. Real-time ICS visibility and threat detection that compliments existing IT/OT processes and cybersecurity infrastructure can greatly improve cyber resiliency.
How do these new technologies tackle ICS cybersecurity?read more
Nozomi Networks was a top contender in the ICS Detection Challenge at the S4 conference. Our product quality and depth were highlighted, reinforcing why customers around the globe have chosen to deploy our solution.
We commend this contest for creating this opportunity to showcase what ICS cybersecurity products and research teams in asset discovery and detection can deliver.read more
This week the top minds in industrial cybersecurity are gathered at the S4 conference in Miami. A key initiative of the event is the ICS Detection Challenge, designed to test the capabilities of passive ICS monitoring and threat detection solutions.
Nozomi Networks achieved a high score for asset inventory it was called out by the judges for being “more detailed and more accurate” than the other solutions.read more
We are excited to announce that our company has received $15 million in Series B financing, led by new investor Invenergy Future Fund.
This investment recognizes Nozomi Networks extraordinary accomplishments, demonstrates confidence in our future, and reflects the growing ICS cybersecurity market.
Let’s take a closer look at the reasons behind today’s announcement, and our company’s outlook as we enter 2018.read more
FireEye has reported that it has recently worked with an industrial operator whose facility was attacked by a new type of ICS malware, which they are calling TRITON. The attack reprogrammed a facility’s Safety Instrumented System (SIS) controllers, causing them to enter a failed state, and resulting in an automatic shutdown of the industrial process.
The TRITON attack is bold and notable because it is the first known industrial control system (ICS) attack that has targeted and impacted not just an ICS, but SIS equipment. Fortunately, because of the unique nature of how each plant implements its SIS and overall safety measures, the malware is not readily scalable.read more
After a year that began with the fall-out from another Ukraine electric grid attack, saw the discovery of the first toolset since Stuxnet to target physical systems (CrashOverride/ Industroyer) and included significant harm from ransomware attacks (WannaCry, Petya/NotPetya), what’s in store for 2018?
Our team looked ahead 12 months and thought about how ICS cybersecurity will be different at the end of that period. From there we came up with 5 predictions you won’t want to miss.read more
Cybersecurity threats to the power grid are a continuous danger nowadays, and because of this, regulation in North America may expand from covering bulk electricity carriers to low-impact carriers. Last month FERC, the U.S. Federal Energy Regulatory Commission, proposed a new rule for low-impact carriers, covering transient electronic devices such as USBs and laptops, and incident response policies.
While the regulation is still in the review stage, some low-impact utilities are not waiting to improve their cybersecurity posture and get a head start on compliance. They are taking advantage of the latest innovation for cyber threat monitoring and detection systems. Vermont Electric Coop is one such entity, and they have realized multiple benefits from their proactive approach.
Recently reports of a new ransomware malware known as Bad Rabbit was making headlines in the press. A suspected variant of NotPetya, Bad Rabbit spread quickly through IT networks in Europe and elsewhere.
Our research indicates that while Bad Rabbit infections started to be reported in late October, the group behind the attacks started creating an “infection-network” in July. While not reported as impacting industrial systems, industrial operators should take note of this attack and what it means for their cyber resiliency programs.
Without comprehensive, real-time visibility of industrial control system (ICS) networks, devices and process status, protecting control networks from cyberattacks and avoiding operational disruptions is a serious challenge. Over the last half-decade, Nozomi Networks has built a successful reputation providing a solution to this very problem by offering a non-intrusive, real-time monitoring and threat detection solutionbuilt for ICS.
Now, Nozomi Networks has extended the utility and reach of Nozomi Networks SCADAguardian through an integration with the Palo Alto Networks Next-Generation Firewall (NGFW). Find out why Nozomi Networks chose to integrate with this leading firewall and how the companies’ offerings work in tandem to help bridge the IT/OT gap.read more
Amid rising threats to industrial control systems, it’s good to see more and more operators realizing there is new technology available that can significantly help them with the challenge of ICS cybersecurity. Companies are moving beyond relying on network segmentation, industrial firewalls and SIEMs and want to monitor and analyze their network traffic in real-time so they can immediately act to defend security and reliability.
Our passive ICS cybersecurity and visibility solution addresses that goal, and today I am glad to let you know that we are advancing our offering with our second major product release of 2017. It further enhances our strength in ICS threat detection and addresses the needs of large customers for easy IT/OT integration. Let’s look at the key capabilities in release 17.5.read more