Securing Industrial IoT: There is no simple answer
· Cybersecurity

Securing Industrial IoT: There is no simple answer

There are lots of terms thrown around these days, such as: Internet of Things (IoT), Industrial Controls Systems (ICS), Operational Technology (OT). What this means is that there are billions of interconnected consumer devices and industrial systems, not running a traditional computer operating system. This number dwarfs the number of traditional computer systems and it […]

Read more →
Five cybersecurity experts about CrashOverride malware: main dangers and lessons for IIoT
· Cybersecurity

Five cybersecurity experts about CrashOverride malware: main dangers and lessons for IIoT

The National Cybersecurity and Communications Integration Center (NCCIC) is aware of public reports from ESET and Dragos outlining a new, highly capable Industrial Controls Systems (ICS) attack platform that was reportedly used in 2016 against critical infrastructure in Ukraine. As reported by ESET and Dragos, the CrashOverride malware is an extensible platform that could be […]

Read more →
Addressing the Threat of Ransomware
· Cybersecurity

Addressing the Threat of Ransomware

Recently there was a global ransomware cyberattack as never seen before. This single attack affected more than 200 000 computers and wreaked havoc on financial institutions, healthcare organizations and transportation to name just a few. This is the kind of attack that utilities and other critical infrastructure operators must guard against. “To put the problem […]

Read more →
The Industrial Internet of Things & Network Security Standards
· Cybersecurity

The Industrial Internet of Things & Network Security Standards

Just about everything is connected: from cell phones and wearable devices to cars, refrigerators and industrial equipment. IT experts have long recognized this global connectivity will only continue to skyrocket. Connectivity adds convenience to our jobs. It is almost expected that employees will use BYOD devices such as laptops, smart phones and tablets to communicate. […]

Read more →
CEO Insights with Dr. Ulrich Lang: Customers are not aware yet of ICS security risks that IIoT Apps bring
· CEO Insights

CEO Insights with Dr. Ulrich Lang: Customers are not aware yet of ICS security risks that IIoT Apps bring

IIoT applications bring many ICS security risks to critical industries like manufacturing, energy, oil and gas, chemical, transportation. As a part of CEO Insights, Dr. Ulrich Lang, Co-founder and CEO of ObjectSecurity, explains what are the most critical cybersecurity risks, how to address them, and also what are the challenges and opportunities in this market. […]

Read more →
The impact of WannaCry on industrial control systems (ICS)
· Cybersecurity

The impact of WannaCry on industrial control systems (ICS)

As the WannaCry ransomware (MS17-010) has spread globally in the last 24 hours and severely impacted the National Health System and locked hospital workers out of critical healthcare patient data,  Brad Hegrat, IOActive’s Director of Advisory Services, explains the impact of WannaCry on industrial control systems (ICS).  The impact of WannaCry on ICSA few weeks ago back […]

Read more →
Using DNS to Defend Against IoT Botnets
· Cybersecurity

Using DNS to Defend Against IoT Botnets

Sometimes cyberattacks come from a direction you weren’t really expecting. We all know about threats from ransomware, nation-state actors, industrial espionage, or hacker collectives looking for personally-identifiable information (particularly for credit cards). But we probably weren’t expecting our sites and services to be collateral damage in a small but nasty war in the world of […]

Read more →
Top Internet of Things Research Frontiers of the Leaders
· Digital Disruption

Top Internet of Things Research Frontiers of the Leaders

Over the past years, the Internet has redefined Business to Business (B2B) industries. The evolution of technology will dramatically alter manufacturing, energy, agriculture, transportation and other industrial sectors of the economy. It is already transforming how people work through new interactions between humans and machines. Dubbed the Industrial Internet of Things (IIoT), this latest wave […]

Read more →
A solution to keep water clean from cyber attacks
· Cybersecurity

A solution to keep water clean from cyber attacks

The primary source for cyber risks in water and waste management facilities comes from the use of wide-area-networks (WANs) for monitoring and the collection of data. A typical water site has two primary WAN connections: One to the corporate network, and through that network to the Internet, and customers, partners and vendors. The other WAN is connected […]

Read more →
ICS Security Lags In U.S. Oil And Gas Industry
· Cybersecurity

ICS Security Lags In U.S. Oil And Gas Industry

A research from the Ponemon Institute finds digitalization in U.S. Oil and Gas operations is seriously outpacing cybersecurity measures and that’s creating an undeniable risk to operational security. In “The State of Cybersecurity in the Oil & Gas Industry: United States,” released in March, 68% of those surveyed said their operations have had at least one security […]

Read more →
Top 10 Prioritization Metrics for a better Cybersecurity
· Cybersecurity

Top 10 Prioritization Metrics for a better Cybersecurity

Most organizations are overwhelmed, understaffed, and/or underfunded when it comes to cybersecurity. These constraints create a critical need to prioritize on the most critical cybersecurity measures. However, often these priorities are unclear or hard to determine, leading to less-than-optimal cybersecurity product purchases and/or activities. This is because the metrics about which overarching cybersecurity priorities matter […]

Read more →