Nozomi Networks was a top contender in the ICS Detection Challenge at the S4 conference. Our product quality and depth were highlighted, reinforcing why customers around the globe have chosen to deploy our solution.
We commend this contest for creating this opportunity to showcase what ICS cybersecurity products and research teams in asset discovery and detection can deliver.
This week the top minds in industrial cybersecurity are gathered at the S4 conference in Miami. A key initiative of the event is the ICS Detection Challenge, designed to test the capabilities of passive ICS monitoring and threat detection solutions.
Nozomi Networks achieved a high score for asset inventory it was called out by the judges for being “more detailed and more accurate” than the other solutions.
We are excited to announce that our company has received $15 million in Series B financing, led by new investor Invenergy Future Fund.
This investment recognizes Nozomi Networks extraordinary accomplishments, demonstrates confidence in our future, and reflects the growing ICS cybersecurity market.
Let’s take a closer look at the reasons behind today’s announcement, and our company’s outlook as we enter 2018.
FireEye has reported that it has recently worked with an industrial operator whose facility was attacked by a new type of ICS malware, which they are calling TRITON. The attack reprogrammed a facility’s Safety Instrumented System (SIS) controllers, causing them to enter a failed state, and resulting in an automatic shutdown of the industrial process.
The TRITON attack is bold and notable because it is the first known industrial control system (ICS) attack that has targeted and impacted not just an ICS, but SIS equipment. Fortunately, because of the unique nature of how each plant implements its SIS and overall safety measures, the malware is not readily scalable.
Recently reports of a new ransomware malware known as Bad Rabbit was making headlines in the press. A suspected variant of NotPetya, Bad Rabbit spread quickly through IT networks in Europe and elsewhere.
Our research indicates that while Bad Rabbit infections started to be reported in late October, the group behind the attacks started creating an “infection-network” in July. While not reported as impacting industrial systems, industrial operators should take note of this attack and what it means for their cyber resiliency programs.