Black Hat: Understanding TRITON, The First SIS Cyber Attack

Black Hat: Understanding TRITON, The First SIS Cyber Attack

Today at Black Hat USA I am part of a team speaking about the landmark TRITON malware attack. We are presenting new research on TRITON, releasing two tools to help defend against it and publishing a white paper summarizing our findings.

The TRITON malware attack went beyond other industrial cyber attacks by directly interacting with a Safety Instrumented System (SIS). Asset owners should act immediately to secure their SIS — and the information in our white paper will help.

Electric Grid Cyber Security: Ten Actions Utilities Can Do Now

Electric Grid Cyber Security: Ten Actions Utilities Can Do Now

Concerns about cyber attacks on the U.S. critical infrastructure have reached a new level with The Wall Street Journal reporting “an evolution in the U.S. government’s thinking about how to deter malicious cyberactors”.

Find out ten actions that can be done quickly to monitor and secure the electrical grid against determined threat actors.

Why Business Leaders Need to Focus on Industrial Cyber Security

Why Business Leaders Need to Focus on Industrial Cyber Security

Today’s business leaders are expected to manage risk for their entire organization – from enterprise IT systems to OT environments. With IT and OT systems becoming more connected, and cyberattacks on industry rising, managing risk means shifting focus to industrial cyber security.
Two of the most important measures to take are bringing together IT and OT teams and investing in new technology that improves the visibility and cyber resiliency of industrial networks.

Nozomi Networks Scales Globally to Deliver Advanced ICS Cyber Security

Nozomi Networks Scales Globally to Deliver Advanced ICS Cyber Security

The demand for industrial IT/OT solutions is growing rapidly and to meet it our company has just released a new version of our product suite which delivers significant enhancements. We have also broadened our partner ecosystem and expanded our global presence.

Read on to learn how those responsible for large, distributed installations can better manage escalating threats with our 4th generation ICS cyber security and operational visibility solution.