The 4 Questions Industrial CISOs Need to Ask When Evaluating a Cybersecurity Tool

| | CISO, ICS Security
Cybersecurity is finally reaching the shop floor in earnest thanks to new technology that works with—not against—the legacy equipment that runs most industrial control systems (ICS). That being said, industrial companies and ...
How-to-Build-Resiliency-Against-Cyber-Attacks

Suzanne Spaulding: How to Build Resiliency Against Cyberattacks

If you weren’t one of the 3,000 security leaders who attended the Gartner Security & Risk Management Summit 2019 in National Harbor, you missed an important talk. During her session on “Accelerating ...

To Air-Gap or Not Air-Gap Industrial Control Networks

| | air gap, ICS, ICS Security
What is air-gapping, and why do we air-gap networks? What camp are you in? In the camp that believes in air-gaps, or the other set that says they truly do not exist? ...

How to Advance ICS Cybersecurity: Implement Continuous Monitoring

Industrial Control Systems (ICS) include Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS) and other control system configurations such as Programmable Logic Controllers (PLC). They are typically used in ...
Cyber-Security-for-Midstream-Operators

Operational Visibility Boosts Cyber Security for Midstream Operators

Companies operating in the midstream oil and gas market face significant challenges in securing their infrastructure. The first step to reducing risk is knowing what devices and networks are running on your ...

Using Visibility to Navigate the Evolving Role of ICS Security

| | ICS Security
The current security state of industrial control systems (ICS) is a perplexing one. On the one hand, Kaspersky Lab found in a recent report that a majority of organizations (75 percent) regard ...
Nozomi-Networks-helps-develop-secure-by-design-power-systems-standards

Using Secure-by-Design Power Systems To Prevent Cyberattacks

Malicious hackers are threatening public safety all over the world. Cyberattacks could cut off the supply of electricity to hospitals, homes, schools and factories. A loss of electricity would also have heavy ...

How to Build an Effective ICS Security Program

Industrial control systems (ICS) security is an important concern for businesses in today’s world. Kaspersky Lab is well aware of this fact. It observed as much in its “The State of Industrial ...
TRITON Framework Leveraged at a Second Critical Infrastructure Facility

TRITON Framework Leveraged at a Second Critical Infrastructure Facility

Researchers have discovered that malicious actors leveraged the TRITON framework at a second critical infrastructure facility. In this particular attack, the threat actor maintained access to the target corporate networks for nearly ...
Loading...