Industrial Cyber Security Blog
If you’re boots-on-the-ground dealing with the daily oil and gas challenges of control and automation, you’ve likely heard lots about Industry 4.0, the fourth wave of industrial revolution. Given the inter-connection between more and more devices and commercially marketed systems, the cyber security challenges of this phase of automation are daunting.
To overcome these hurdles, let’s examine how an application that’s been around for a long time – hosted SCADA, can be monitored for cyber security, data integrity and reliability.read more
Concerns about Russian cyber attacks on U.S. electric utilities have increased again this week. The Wall Street Journal is reporting that such attacks have impacted hundreds of victims, not just the dozens reported earlier.
This news brings a new wave of concern about cyber attacks across the U.S. and beyond. If you are involved in this discussion, following is a recap of what is known about the Russian cyber attacks and my thoughts on its significance and repercussions.read more
In 2017, TRITON malware was used to attack a gas facility, directly interacting with its Safety Instrumented System (SIS). Given the significance of this attack, Nozomi Networks conducted research to better understand how TRITON works.
Today we released a Wireshark dissector for the TriStation protocol on GitHub to help the ICS community understand SIS communications. Our complete TRITON analysis will be presented at Black Hat USA 2018.read more
We’re excited to tell you that Nozomi Networks and IBM Security have teamed up to address the exploding demand for effective, integrated IT/OT cyber security services and solutions. Read on to see how industrial organizations around the world now get easy access to deep OT network visibility and continuous threat detection.read more
Today’s business leaders are expected to manage risk for their entire organization – from enterprise IT systems to OT environments. With IT and OT systems becoming more connected, and cyberattacks on industry rising, managing risk means shifting focus to industrial cyber security.
Two of the most important measures to take are bringing together IT and OT teams and investing in new technology that improves the visibility and cyber resiliency of industrial networks.
The demand for industrial IT/OT solutions is growing rapidly and to meet it our company has just released a new version of our product suite which delivers significant enhancements. We have also broadened our partner ecosystem and expanded our global presence.
Read on to learn how those responsible for large, distributed installations can better manage escalating threats with our 4th generation ICS cyber security and operational visibility solution.read more
Cyber threats can damage your critical OT infrastructure – and your reputation. The Nozomi Networks solution improves cyber resiliency and operational reliability. Standing Partnership’s reputation management advice helps you manage the risk that comes with an attack.
Combining crisis preparedness with advanced cyber security technology will leave you well equipped to protect your OT network – and your reputation, when a cyber incident happens.read more
At the RSA Conference in San Francisco, many CISOs and IT leaders shared that OT risk management, defense and resiliency topped their must-have list.
Nozomi Networks and Fortinet deliver one ‘knock-out’ IT/OT cyber security solution for network and operational visibility, risk assessment, and proactive defense. Read on to see how it tackles two of the most common OT use cases.read more
With alarming headlines about cyberattacks prevalent in the news, managing IT/OT risks has become a top issue for executives. On the OT side, the reality, however, is that staff generally do not have the tools needed to stay on top of cyber security risks.
Fortunately, new solutions are available to help. Find out how the network visualization and asset inventory capabilities of SCADAguardian reduce OT risk.read more
Based on recent reports of Russian involvement in a multistage intrusion of the US power grid, it’s no longer a question of “if” threat actors will gain access to critical infrastructure control systems – it’s when it will happen again, and for what purpose.
What can be done to thwart these potentially disruptive assaults?read more