IT and OT

IT Joins OT in the Control Center

Increasingly in industrial environments, IT and OT must work together to ensure end-to-end security If you glance at the minutes of a boardroom meeting for a large energy or manufacturing company, often ...
Security Boulevard
U.S. Cyber Command

U.S. Cyber Has Hacked Russian Power Grid, Say Super-Secret Sources

The infosec cold war continues to grumble on under the surface. Sources claim the U.S. has implanted malware deep into Russia’s electricity grid ...
Security Boulevard
Changing Nature of Malware, Cybersecurity Threats

CyberX Raises $18M to Address Industrial Cybersecurity

As concerns about Internet of things (IoT) cybersecurity continue to mount, money to address these issues is starting to pour in from investors. CyberX, a provider of a platform for securing industrial ...
Security Boulevard

Trends in Industrial Control Systems Cybersecurity

With connectivity to the outside world growing, cyber attacks on industrial computers constitute an extremely dangerous threat, as these types of incidents can cause material losses and production downtime for a whole ...

Developing Cyber Security Incident Response Plans for Industrial Control Systems

The post Developing Cyber Security Incident Response Plans for Industrial Control Systems appeared first on Delta Risk ...
Security Challenges for ICS, OT

Meeting the Security Challenges for ICS, OT

Operational technology (OT) makes our factories run and ensures the critical infrastructure can fulfill its services. Yet, when we talk about manufacturing and systems in terms of cybersecurity, the focus tends to ...
Security Boulevard
Endpoints Disguised as 'Stuff'

Security’s Greatest Enemy: Endpoints Disguised as ‘Stuff’

When considering the security of the devices that make up the internet of things (IoT), all endpoints must be considered in the risk equation. For years the standard model for non-traditional IT ...
Security Boulevard
Iran-Linked RASPITE Group Targets U.S. Electric Utilities

Iran-Linked RASPITE Group Targets U.S. Electric Utilities

A known threat group believed to be based in Iran is trying to gain access to computer infrastructure belonging to U.S. electric utility organizations. The group, which researchers from industrial control systems ...
Security Boulevard

The Black Swan: Mitigating Cyber Attacks Within ICS Environments

ICSs are specialized resulting in limited industry expertise spanning ICS, IT, and security. In terms of mitigation techniques, most vendors and organizations leverage generic security methodologies resulting in a reactive approach. RSA ...
New Triton Malware Framework Attacks Critical Infrastructure

New Triton Malware Framework Attacks Critical Infrastructure

Security researchers have come across new malware designed to infect specialized safety controllers used in industrial infrastructure, in what is believed to be a well-funded nation state attack. The malware framework was ...
Security Boulevard