“The initial information available from Colonial Pipeline and the press coverage seems to indicate that they had the processes in place to detect and contain this type of attacks – before it had an opportunity to be exploited further and cause more damage,” Edgard Capdevielle, CEO of Nozomi Networks, told SecurityWeek. “ I’m sure there will be a financial impact for having to take systems offline in this containment, but imagine an attack where they didn’t have the systems and processes in place and they lost control of their business for an extended period of time. It would make the cost of proactively taking things offline look like a rounding error.”
Recent Posts
Tags
Critical infrastructure (9)
Critical Infrastructure Cybersecurity (36)
Critical Infrastructure Security (9)
cybersecurity (69)
cyber threat analysis (5)
Defense in Depth (7)
Guardian (6)
ICS anomaly detection (23)
ICS Asset Inventory (13)
ICS Cybersecurity (63)
ICS Cybersecurity for Substations and Power Grids (5)
ICS Detection Challenge (7)
ICS intrusion detection (6)
ICS Operational Visibility (5)
ICS security (66)
ICS Threat Detection (5)
IEC 61850 (4)
IEC 62351 (9)
IIoT (6)
IIoT Security (7)
industrial control system (9)
Industrial Cybersecurity (52)
Industrial cybersecurity solutions (15)
industrial security (43)
Industroyer (7)
IoT (5)
IoT cybersecurity (15)
IoT devices (4)
IoT device security (5)
IoT Security (38)
IT/OT convergence (6)
Nozomi Networks (7)
Nozomi Networks Labs (5)
operational technology security (6)
OT Cybersecurity (35)
OT security (52)
Power Grid (5)
Power System Security (4)
ransomware (7)
S4 (5)
SANS ICS Survey (5)
SCADA security (12)
threat intelligence (7)
TRITON (8)
WG15 (6)