Thwarting a Power Grid Control Center Cyberattack

Thwarting a Power Grid Control Center Cyberattack

Based on recent reports of Russian involvement in a multistage intrusion of the US power grid, it’s no longer a question of “if” threat actors will gain access to critical infrastructure control systems – it’s when it will happen again, and for what purpose.

What can be done to thwart these potentially disruptive assaults?

Russian Cyberattacks on Critical Infrastructure – What You Need to Know

Russian Cyberattacks on Critical Infrastructure – What You Need to Know

The U.S. government has just released an important cybersecurity alert that confirms Russian government cyberattacks targeting energy and other critical infrastructure sectors.

The cyber campaign described is not new however, rather it is likely an expanded version of the Dragonfly 2.0 playbook. The Nozomi Networks solution ships today with an analysis toolkit that identifies the presence of Dragonfly.

$15 Million Investment Fuels Nozomi Networks Future Growth

$15 Million Investment Fuels Nozomi Networks Future Growth

We are excited to announce that our company has received $15 million in Series B financing, led by new investor Invenergy Future Fund.

This investment recognizes Nozomi Networks extraordinary accomplishments, demonstrates confidence in our future, and reflects the growing ICS cybersecurity market.

Let’s take a closer look at the reasons behind today’s announcement, and our company’s outlook as we enter 2018.

New TRITON ICS Malware is Bold and Important

New TRITON ICS Malware is Bold and Important

FireEye has reported that it has recently worked with an industrial operator whose facility was attacked by a new type of ICS malware, which they are calling TRITON. The attack reprogrammed a facility’s Safety Instrumented System (SIS) controllers, causing them to enter a failed state, and resulting in an automatic shutdown of the industrial process.

The TRITON attack is bold and notable because it is the first known industrial control system (ICS) attack that has targeted and impacted not just an ICS, but SIS equipment. Fortunately, because of the unique nature of how each plant implements its SIS and overall safety measures, the malware is not readily scalable.

2018 Predictions: ICS Cybersecurity Goes Mainstream

2018 Predictions: ICS Cybersecurity Goes Mainstream

After a year that began with the fall-out from another Ukraine electric grid attack, saw the discovery of the first toolset since Stuxnet to target physical systems (CrashOverride/ Industroyer) and included significant harm from ransomware attacks (WannaCry, Petya/NotPetya), what’s in store for 2018?

Our team looked ahead 12 months and thought about how ICS cybersecurity will be different at the end of that period. From there we came up with 5 predictions you won’t want to miss.