Blog

 

Comprehensive OT Cyber Security from Nozomi Networks & Fortinet

Comprehensive OT Cyber Security from Nozomi Networks & Fortinet

At the RSA Conference in San Francisco, many CISOs and IT leaders shared that OT risk management, defense and resiliency topped their must-have list.

Nozomi Networks and Fortinet deliver one ‘knock-out’ IT/OT cyber security solution for network and operational visibility, risk assessment, and proactive defense. Read on to see how it tackles two of the most common OT use cases.

read more
Reduce OT Risk with ICS Network Visualization and Asset Inventory

Reduce OT Risk with ICS Network Visualization and Asset Inventory

With alarming headlines about cyberattacks prevalent in the news, managing IT/OT risks has become a top issue for executives. On the OT side, the reality, however, is that staff generally do not have the tools needed to stay on top of cyber security risks.

Fortunately, new solutions are available to help. Find out how the network visualization and asset inventory capabilities of SCADAguardian reduce OT risk.

read more
Thwarting a Power Grid Control Center Cyberattack

Thwarting a Power Grid Control Center Cyberattack

Based on recent reports of Russian involvement in a multistage intrusion of the US power grid, it’s no longer a question of “if” threat actors will gain access to critical infrastructure control systems – it’s when it will happen again, and for what purpose.

What can be done to thwart these potentially disruptive assaults?

read more
Russian Cyberattacks on Critical Infrastructure – What You Need to Know

Russian Cyberattacks on Critical Infrastructure – What You Need to Know

The U.S. government has just released an important cyber security alert that confirms Russian government cyberattacks targeting energy and other critical infrastructure sectors.

The cyber campaign described is not new however, rather it is likely an expanded version of the Dragonfly 2.0 playbook. The Nozomi Networks solution ships today with an analysis toolkit that identifies the presence of Dragonfly.

read more
Nozomi Networks Finishes Strong in S4 ICS Detection Challenge

Nozomi Networks Finishes Strong in S4 ICS Detection Challenge

Nozomi Networks was a top contender in the ICS Detection Challenge at the S4 conference. Our product quality and depth were highlighted, reinforcing why customers around the globe have chosen to deploy our solution.

We commend this contest for creating this opportunity to showcase what ICS cyber security products and research teams in asset discovery and detection can deliver.

read more
Nozomi Networks Quality Stands Out in ICS Detection Challenge at S4

Nozomi Networks Quality Stands Out in ICS Detection Challenge at S4

This week the top minds in industrial cyber security are gathered at the S4 conference in Miami. A key initiative of the event is the ICS Detection Challenge, designed to test the capabilities of passive ICS monitoring and threat detection solutions.

Nozomi Networks achieved a high score for asset inventory it was called out by the judges for being “more detailed and more accurate” than the other solutions.

read more
$15 Million Investment Fuels Nozomi Networks Future Growth

$15 Million Investment Fuels Nozomi Networks Future Growth

We are excited to announce that our company has received $15 million in Series B financing, led by new investor Invenergy Future Fund.

This investment recognizes Nozomi Networks extraordinary accomplishments, demonstrates confidence in our future, and reflects the growing ICS cyber security market.

Let’s take a closer look at the reasons behind today’s announcement, and our company’s outlook as we enter 2018.

read more
New TRITON ICS Malware is Bold and Important

New TRITON ICS Malware is Bold and Important

FireEye has reported that it has recently worked with an industrial operator whose facility was attacked by a new type of ICS malware, which they are calling TRITON. The attack reprogrammed a facility’s Safety Instrumented System (SIS) controllers, causing them to enter a failed state, and resulting in an automatic shutdown of the industrial process.

The TRITON attack is bold and notable because it is the first known industrial control system (ICS) attack that has targeted and impacted not just an ICS, but SIS equipment. Fortunately, because of the unique nature of how each plant implements its SIS and overall safety measures, the malware is not readily scalable.

read more