ICS Security

  /  ICS Security

A SolarWinds-style cyberattack happened back in in 2013-14 that affected big government agencies and thousands of companies. What should we have learned from the Dragonfly/HAVEX attack? Software Infiltration A cyberattack group called Dragonfly attacked power plants and industrial sites, employing a very

Manufacturing organizations manage expensive and sophisticated equipment at their factories—and the systems that run the machinery are increasingly being connected to the internet. The cybersecurity implications of this trend are significant, including possible threats to physical safety, and in some

All critical infrastructure is under cyber attack, all the time. The attack on the Oldsmar, FL water supply is a good example. And it’s getting worse; vulnerability to cyber attack is increasing as the embedded devices controlling these critical infrastructures become more

Last month, a major water utilities firm in the UK revealed plans to move a significant part of their SCADA system to the cloud. This is one of the most high-profile transitions of OT to managed cloud services to date. Though moving Industrial

Looking back at a most unprecedented year, Trend Micro’s Annual cybersecurity Report surveys the most notable and crucial security concerns that emerged and persisted in 2020, and provides users and organizations with insights into how they can navigate a drastically changing threat

In late October 2020, the US Federal Government announced plans to impose sanctions on a Russian research institute that has been linked with cyber-attacks. The institute is alleged to have played a part in building the customized tools used in the TRITON

In its recent Cloud Workload Protection Platform (CWPP) research note, Gartner identified memory exploit protection as an essential component of any organization’s CWP strategy (Gartner, Cloud Workload Protection Platforms, 2020):  “Exploit Prevention/Memory Protection–application control solutions are fallible and must be combined with

Fortinet has worked with Forrester Consulting for a third time to check in on security trends affecting those who manage and maintain critical infrastructure—including the industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems that manage everything

Re-Emagineering the CyberSecurity driven convergence of OT to IIOT The exploitation and sabotage of resources has been a concern to mission critical operations since the dawn of the industrial age. With the advancement of Information Technology (IT), opportunities to compromise, corrupt

You don't have permission to register