Today at Black Hat USA we’re presenting an innovative power grid cyber security solution that greatly improves monitoring of intelligent electronic devices (IEDs).
Using the IEC 62351 standard for monitoring industrial networks, we demonstrate how four types of hard-to-detect attacks are readily identified.
Companies operating in the midstream oil and gas market face significant challenges in securing their infrastructure. The first step to reducing risk is knowing what devices and networks are running on your system.
Find out how an industrial cyber security and visibility solution addresses the real-world challenges of pipeline operators.
Thanks to TRITON, the Oil and Gas industry became ground zero for the convergence of SIS process safety and ICS cybersecurity.
Read on to learn why a unified approach to monitoring control system and process safety assets is now mission critical, and what steps you can take to strengthen security.
Operators in the midstream oil and gas industry know their main priority is to keep product flowing through the pipeline. With that focus, its hard to notice subtle changes that may cause a costly problem in the future.
Find out how one operator experienced $1.9 million in lost revenue due to unscheduled downtime – and how real-time industrial network monitoring can help.
Today at Black Hat USA I am part of a team speaking about the landmark TRITON malware attack. We are presenting new research on TRITON, releasing two tools to help defend against it and publishing a white paper summarizing our findings.
The TRITON malware attack went beyond other industrial cyber attacks by directly interacting with a Safety Instrumented System (SIS). Asset owners should act immediately to secure their SIS — and the information in our white paper will help.
If you’re boots-on-the-ground dealing with the daily oil and gas challenges of control and automation, you’ve likely heard lots about Industry 4.0, the fourth wave of industrial revolution. Given the inter-connection between more and more devices and commercially marketed systems, the cyber security challenges of this phase of automation are daunting.
To overcome these hurdles, let’s examine how an application that’s been around for a long time – hosted SCADA, can be monitored for cyber security, data integrity and reliability.