Compromised Human Interface Devices (HID) such as a mouse, keyboard, or other USBs, which can be found in offices or industrial environments, can be adapted to perform physical attacks. Imagine the cyber-physical effect of an insider plugging a compromised keyboard/mouse into a workstation or Human Machine Interface (HMI). With the aim of setting up a proof of concept, Nozomi Networks and the Hydro-Québec Research Institute (IREQ) will explain how to detect, notify, and recommend proper countermeasures around compromised hardware devices.
We’re excited to tell you that GE and Nozomi Networks have joined forces to provide our advanced cyber security solution to power utilities and critical infrastructure operations around the world.
Our global agreement gives GE Power customers immediate access to our leading real-time ICS visibility, network monitoring and cyber security solutions.
Last month we launched our partnership with digital transformation heavyweight Atos. Combining Atos analytics on data from industrial devices, with our cyber security processes, takes operational visibility and OT security to new levels.
But the real value goes way beyond cyber security – to include lower total cost of ownership and business resilience. Read on to learn more.
As I travel the world visiting industrial sites, I am seeing the state of ICS cybersecurity changing. While most of our customers are very satisfied with our passive solution, some organizations want deeper visibility.
Today I am proud to announce a new, additional product line, SCADAguardian Advanced™ (SGA), that builds on our passive technology but adds ICS-safe Smart Polling™ to further identify assets, vulnerabilities and threats.
If you’re boots-on-the-ground dealing with the daily oil and gas challenges of control and automation, you’ve likely heard lots about Industry 4.0, the fourth wave of industrial revolution. Given the inter-connection between more and more devices and commercially marketed systems, the cyber security challenges of this phase of automation are daunting.
To overcome these hurdles, let’s examine how an application that’s been around for a long time – hosted SCADA, can be monitored for cyber security, data integrity and reliability.