Companies operating in the midstream oil and gas market face significant challenges in securing their infrastructure. The first step to reducing risk is knowing what devices and networks are running on your system.
Find out how an industrial cyber security and visibility solution addresses the real-world challenges of pipeline operators.
Today, the U.S. Department of Homeland Security issued ICS CERT Advisory (ICSA-19-120-01) concerning Rockwell Automation CompactLogix controllers.
Nozomi Networks responsibly disclosed the vulnerability to CISA and Rockwell Automation.
Read on to learn about our findings and gain a better understanding of the cyber risks of legacy devices.
Malicious hackers are threatening public safety all over the world. Cyberattacks could cut off the supply of electricity to hospitals, homes, schools and factories. A loss of electricity would also have heavy implications for other vital services.
To learn why secure-by-design power system are essential to cyber resiliency, read on.
Leading a successful cyber security solution PoC takes a laser-like focus on project management (aka scoping, scheduling and herding cats), along with softer skills like relationship building, negotiation and patience.
I’ve often been asked about the most important considerations in planning for an ICS Proof of Concept. From use cases to subjective metrics to scope creep, read on to learn what I think matters the most.
It was reported today that Norsk Hydro has temporarily stopped aluminum production at several plants following an attack by the ransomware known as LockerGoga.
Nozomi Networks Labs has conducted a preliminary evaluation of LockerGoga. Read on to learn about this ransomware and our research team’s assessment of it.
Nozomi Networks Labs is committed to conducting cyber security research that makes industrial organizations more secure. Our latest project involves enhancing Radamsa, an open source fuzzing tool for testing software.
Our new code makes it faster and easier to test devices that communicate over industrial networks, such as PLCs and RTUs, for security vulnerabilities.