5 Things to Consider for Your ICS Security Proof of Concept

5 Things to Consider for Your ICS Security Proof of Concept

Leading a successful cyber security solution PoC takes a laser-like focus on project management (aka scoping, scheduling and herding cats), along with softer skills like relationship building, negotiation and patience.
I’ve often been asked about the most important considerations in planning for an ICS Proof of Concept. From use cases to subjective metrics to scope creep, read on to learn what I think matters the most.

$30 Million Funding Fuels Nozomi Networks’ ICS Security Leadership

$30 Million Funding Fuels Nozomi Networks’ ICS Security Leadership

I’m thrilled to share with you that Nozomi Networks existing investors are committing further funds to back us as the leading industrial cyber security company. We have just announced a Series C round of funding of $30 million, bringing our total investment to $54 million.

Our momentum is accelerating across key areas: customer acquisition, technology innovation, partnerships and global expansion.

Overcoming IT/OT Cybersecurity Convergence Roadblocks

Overcoming IT/OT Cybersecurity Convergence Roadblocks

Many organizations still view IT and OT cyber security as unique issues to address, yet the need for convergence has never been more important. Attackers exploit the security gaps between IT and OT technologies exactly because those responsible for their defense have different priorities.

While challenging to achieve, IT / OT convergence will eliminate security gaps and reduce overall cyber risk. Read on to learn more.

Open Source Software Exposes ICS Device Vulnerabilities to Hackers

Open Source Software Exposes ICS Device Vulnerabilities to Hackers

It’s disturbing to think that disruption and damage to our critical infrastructure can happen by simply combining the use of OSS tools with malicious intent. Fortunately, those same tools are being used by ICS security researchers around the world to increase industrial control systems cyber security.

Read on to learn why transportation, communications, energy and emergency services are so exposed, and what’s being done to close the ICS cyber security gap.