Adhering to the NIST Cybersecurity Framework with the Indegy Platform
· Cybersecurity

Adhering to the NIST Cybersecurity Framework with the Indegy Platform

US national security depends on the reliability and continuous operations of the nation’s critical infrastructure. The increasing complexity and connectivity of critical infrastructure systems exposes them to cybersecurity threats which put their safety and reliability at risk. The National Institute of Standards and Technology (NIST) Framework was created through the collaboration of the government and […]

Read more →
The Recycling of Industrial Cyber-Attacks
· Cybersecurity

The Recycling of Industrial Cyber-Attacks

How the Malware Dumpster Became Post-industrial Landfill For companies involved in critical infrastructure or any facet of manufacturing processes, one of the big action items today is securing OT. For the very first time, the security of the industrial computers (which run discrete and continuous processes such as PLCs, DCSs and HMIs) has eclipsed the […]

Read more →
[Infographic] 7 Most Unsafe Gaps for Industrial Cybersecurity
· Cybersecurity

[Infographic] 7 Most Unsafe Gaps for Industrial Cybersecurity

Although WannaCry and Petya did not specifically target industrial networks, they did reach them. Many IT leaders and their board of directors responded in panic. The incidents raised the profile of how malware can move to ICS environments. It opened up perspective that if bad actors wanted to launch a ransomware attack on industrial networks, they clearly could. Protect Your Entire Network – that […]

Read more →
2020 Predictions – what we will likely see in industrial cybersecurity
· Cybersecurity

2020 Predictions – what we will likely see in industrial cybersecurity

On January 8th, 2020, at 12 PM EST, Barak Perelman, co-founder and CEO of Indegy will discuss his predictions for what will happen next in Industrial Cyber Security in 2020. He will also provide actionable information on what we will need to address in order to keep critical infrastructure and industrial operations safe from cyber threats. […]

Read more →
How to Actively Secure Your Industrial Environment In the New Era of Distrust
· Cybersecurity

How to Actively Secure Your Industrial Environment In the New Era of Distrust

Today’s sophisticated Operations Technology (OT) environments have a large attack surface with numerous attack vectors. Without complete coverage, the likelihood of getting attacked is not a matter of ‘if’; it’s a matter of ‘when’. Security for OT has gained significant attention due to a confluence of events. Up until only recently the IT infrastructure played front […]

Read more →
Mind the Gap – a Road to IT/OT Alignment
· Cybersecurity

Mind the Gap – a Road to IT/OT Alignment

Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. In a very standard environment, thousands of devices exist and are increasingly being connected via the Industrial Internet of Things (IIoT). This creates new challenges in securing industrial environments specifically by making cyber-security threats even more difficult to detect, investigate […]

Read more →
Manufacturing Case Study – Securing Nesher Cement Enterprises
· Cybersecurity

Manufacturing Case Study – Securing Nesher Cement Enterprises

Nesher Israel Cement Enterprises is the largest cement producer in Israel. With a large-scale production sites in Ramla and Haifa, Nesher produces about 60% of the cement used by Israel’s construction industry. With the introduction of “connected” technologies, Nesher realized that its SCADA network could potentially be exposed to cyber threats that jeopardize the safety […]

Read more →
The Cybersecurity Implications of Infrastructure Modernization
· Cybersecurity

The Cybersecurity Implications of Infrastructure Modernization

The adoption of new technologies in oil and gas facilities is a dual-edged sword. On one side, there are the obvious benefits of implementing industrial internet of things (IIoT) devices to improve efficiencies and reduce operational costs. On the other side, there are inherent risks associated with upgrading systems and with the cybersecurity infrastructure. Cybersecurity […]

Read more →
The Guide to Choosing an Industrial Cybersecurity Solution
· Cybersecurity

The Guide to Choosing an Industrial Cybersecurity Solution

As you evaluate ICS cyber security solutions to protect your critical infrastructure from threats, there are a few criteria your team must consider throughout the process. We’ve compiled a checklist to help you select a solution that will enable both your ICS engineers and security personnel to secure and control your critical networks. Download this resource […]

Read more →
Insiders – the biggest security threat to their organizations
· Cybersecurity

Insiders – the biggest security threat to their organizations

It was only a matter of time before what befell the Information Technology (IT) community was going to affect the Operational Technology (OT) community. Today, the OT C-suite is saddled with agenda items keeping them up at night. It is the constant and unrelenting security threat that at any moment can land the organization on […]

Read more →
A better security for critical infrastructure using strong authentication
· Cybersecurity

A better security for critical infrastructure using strong authentication

November is National Critical Infrastructure Security and Resilience Month so I thought it would be a great opportunity to discuss some of the security challenges concerning critical infrastructure, specifically the weak access controls in sensitive operational technology (OT) environments. Strong authentication is an essential requirement for critical infrastructure When defending critical infrastructure, it’s necessary to […]

Read more →