2020 Annual Cybersecurity Report
· ICS Security

2020 Annual Cybersecurity Report

Looking back at a most unprecedented year, Trend Micro’s Annual cybersecurity Report surveys the most notable and crucial security concerns that emerged and persisted in 2020, and provides users and organizations with insights into how they can navigate a drastically changing threat landscape.  One of the areas of concern is supply chains. Cybersecurity Threats on Supply Chains […]

Read more →
Is Malware hiding in your ICS Network?
· Cybersecurity

Is Malware hiding in your ICS Network?

Most industrial organizations still consider their ICS networks to be safe from common cyber threats that mainly target IT networks. However, two recent cryptocurrency mining incidents demonstrate that  ICS networks are not “sterile” from unwanted software. Moreover, the fact that these cyber incidents took place at critical infrastructure facilities in Europe and Russia shatters the myth that […]

Read more →
Renewable resources can increase cyber threats
· Cybersecurity

Renewable resources can increase cyber threats

Renewable resources are good for the environment and reduce consumer costs but they are not a panacea to reducing electric grid cyber threats despite the prevailing view by many that renewable resources can reduce the cyber threat to electric utilities. I did a walkdown of several utility-scale solar facilities. Consider your roof-top solar system and […]

Read more →
Hacking Level 0,1 devices can be more significant than Stuxnet
· Cybersecurity

Hacking Level 0,1 devices can be more significant than Stuxnet

Last week, the cyber security focus was on the four natural gas pipeline companies that had their electronic data interfaces, not control systems, hacked. However, from a control and safety system perspective, I believe the more important disclosure was the ICS CERT vulnerability disclosure of the Moxa serial-to-Ethernet convertors (gateways). This is because these types […]

Read more →
Adhering to the NIST Cybersecurity Framework with the Indegy Platform
· Cybersecurity

Adhering to the NIST Cybersecurity Framework with the Indegy Platform

US national security depends on the reliability and continuous operations of the nation’s critical infrastructure. The increasing complexity and connectivity of critical infrastructure systems exposes them to cybersecurity threats which put their safety and reliability at risk. The National Institute of Standards and Technology (NIST) Framework was created through the collaboration of the government and […]

Read more →
CXO Insights: ICS process data is the calling card for some of the most secured info on the planet
· CEO Insights

CXO Insights: ICS process data is the calling card for some of the most secured info on the planet

Industrial Control Systems (ICS) allow operators to monitor and control industrial processes, including those in manufacturing, power transmission, oil & gas, and other industries. You can find Industrial Control Systems in lots of different places – from a precise formulation of a particular drug, medicine to running the power grid to building or managing the […]

Read more →
Four most hard to solve IIoT security issues
· Cybersecurity

Four most hard to solve IIoT security issues

According to a forecast by Gartner, the number of IoT devices in use will reach 8.4 billion in 2017 and grow to a staggering 20.4 billion by 2020, and the market opportunity for IoT will reach US$2 trillion by 2017. With the proliferation of IoT devices and technologies in the commercial and industrial sectors, we […]

Read more →
Stop Downplaying Threats to Critical Infrastructure
· Cybersecurity

Stop Downplaying Threats to Critical Infrastructure

It has been an incredibly busy three months in the world of Industrial Control Systems/Critical Infrastructure cybersecurity. A drop in the bucket for what we’ve become used to in the world of IT security – but incredibly noisy for this space – and an alarming precursor for what will come. Yes, we chose “will” come […]

Read more →
Thoughts on the on-going global cyber attacks as they affect ICSs
· Cybersecurity

Thoughts on the on-going global cyber attacks as they affect ICSs

For many years, there have been warnings about the cyber vulnerability of multiple infrastructures world-wide. Yet, those warnings are still not being adequately addressed.  In 2004, the Idaho National Laboratory (INL) provided a glimpse of what we’re seeing today with CrashOverride, etc. As a demonstration for the 2004 ICS Cyber Security Conference, the white hat […]

Read more →
The impact of WannaCry on industrial control systems (ICS)
· Cybersecurity

The impact of WannaCry on industrial control systems (ICS)

As the WannaCry ransomware (MS17-010) has spread globally in the last 24 hours and severely impacted the National Health System and locked hospital workers out of critical healthcare patient data,  Brad Hegrat, IOActive’s Director of Advisory Services, explains the impact of WannaCry on industrial control systems (ICS).  The impact of WannaCry on ICSA few weeks ago back […]

Read more →
SCADA for Remote Utilities Monitoring: 4 Layers to Grasp
· Connected Industry

SCADA for Remote Utilities Monitoring: 4 Layers to Grasp

The term supervisory control and data acquisition systems – also known as SCADA – is quite a mouthful. In reality SCADA is a well-established, if not complex, means for monitoring utilities (among other production and critical infrastructure applications) remotely. SCADA systems collect the data and automate it across the utility’s applications. By definition, SCADA systems […]

Read more →
Top ICS/SCADA Cybersecurity start-ups to watch for in 2017
· Cybersecurity

Top ICS/SCADA Cybersecurity start-ups to watch for in 2017

The New Industrial Internet of Things & Cybersecurity startups are popping up daily and it is easy to understand why. Who would not want to be part of the next big sensation and secure or take their piece of the IoT pie, which some market research companies estimate to far exceed $6 trillion in less than 10 […]

Read more →