Increasing ICS connectivity is exposing industrial networks to new operational risks and cyber threats. Real-time ICS visibility and threat detection that compliments existing IT/OT processes and cybersecurity infrastructure can greatly improve cyber resiliency.
How do these new technologies tackle ICS cybersecurity?
Nozomi Networks was a top contender in the ICS Detection Challenge at the S4 conference. Our product quality and depth were highlighted, reinforcing why customers around the globe have chosen to deploy our solution.
We commend this contest for creating this opportunity to showcase what ICS cybersecurity products and research teams in asset discovery and detection can deliver.
This week the top minds in industrial cybersecurity are gathered at the S4 conference in Miami. A key initiative of the event is the ICS Detection Challenge, designed to test the capabilities of passive ICS monitoring and threat detection solutions.
Nozomi Networks achieved a high score for asset inventory it was called out by the judges for being “more detailed and more accurate” than the other solutions.
We are excited to announce that our company has received $15 million in Series B financing, led by new investor Invenergy Future Fund.
This investment recognizes Nozomi Networks extraordinary accomplishments, demonstrates confidence in our future, and reflects the growing ICS cybersecurity market.
Let’s take a closer look at the reasons behind today’s announcement, and our company’s outlook as we enter 2018.
FireEye has reported that it has recently worked with an industrial operator whose facility was attacked by a new type of ICS malware, which they are calling TRITON. The attack reprogrammed a facility’s Safety Instrumented System (SIS) controllers, causing them to enter a failed state, and resulting in an automatic shutdown of the industrial process.
The TRITON attack is bold and notable because it is the first known industrial control system (ICS) attack that has targeted and impacted not just an ICS, but SIS equipment. Fortunately, because of the unique nature of how each plant implements its SIS and overall safety measures, the malware is not readily scalable.
After a year that began with the fall-out from another Ukraine electric grid attack, saw the discovery of the first toolset since Stuxnet to target physical systems (CrashOverride/ Industroyer) and included significant harm from ransomware attacks (WannaCry, Petya/NotPetya), what’s in store for 2018?
Our team looked ahead 12 months and thought about how ICS cybersecurity will be different at the end of that period. From there we came up with 5 predictions you won’t want to miss.