Meet Guardian Community Edition – a Free Tool for OT & IoT Security

Meet Guardian Community Edition – a Free Tool for OT & IoT Security

Without visibility into your operational assets, you can’t answer three fundamental questions: what’s on your network, how are devices communicating, and is there anything connected to the internet that shouldn’t be?

To encourage more organizations to include OT and IoT assets in their security monitoring programs, we’ve released Guardian Community Edition (Guardian CE) – a free tool that provides visibility into these critical assets.

The Three Most Common Mining Industry Cyber Threats

The Three Most Common Mining Industry Cyber Threats

The mining industry is embracing digital transformation, but it comes at a cost: an increasingly connected operating environment exponentially expands the threat surface. This makes mining operations more vulnerable to cyber threats, and more difficult to protect against attacks.

Read on to learn about the three most common cyber threats facing the mining industry – and steps operators should take to deflect potential attacks.

Advancing IEC Standards for Power Grid Cyber Security

Advancing IEC Standards for Power Grid Cyber Security

Last week Nozomi Networks had the privilege of hosting the first WG15 meeting of 2017. This group is responsible for establishing end-to-end cyber security standards for the world’s power system communication protocols. Read on to learn more about WG15 and how we advanced standards for encrypted communications for the power grids of the future.

Ukraine, Vermont Utility Cyberattacks Highlight Need for Robust ICS Security in 2017

Ukraine, Vermont Utility Cyberattacks Highlight Need for Robust ICS Security in 2017

2016 ended with reports of 2 electric utility organizations, on different sides of the world (Ukraine and Vermont), citing cyberattacks or cyber infections. Both incidents highlight that corporate computer infections can threaten power systems and the need for robust ICS security in 2017. This article highlights the steps involved in the watershed 2015 Ukraine utility cyberattack as it moved from IT to OT systems and suggests ways of improving threat detection and mitigation.

ThyssenKrupp Cyberattack: Protecting ICS from Advanced Persistent Threats

ThyssenKrupp Cyberattack: Protecting ICS from Advanced Persistent Threats

Today’s report of a cyberattack on German conglomerate ThyssenKrupp joins a list of high profile cyberattacks on industry where the goal has been to steal proprietary information (Dragonfly, Flame, Duqu) or disrupt business operations (Shamoon). While Industrial Control Systems (ICS) were not impacted this time, the incident is a reminder to ICS operators of the risks associated with Advanced Persistent Threats.