Critical Infrastructure Cybersecurity: Survey Finds Perfect Storm

Critical Infrastructure Cybersecurity: Survey Finds Perfect Storm

What are the key findings of the Newsweek survey on the cybersecurity risks of cyber-physical systems for critical infrastructure organizations? The post Critical Infrastructure Cybersecurity: Survey Finds Perfect Storm appeared first on ...
Mitigating the Potential Impact of COVID-19-Related OT Security Risks

Mitigating the Potential Impact of COVID-19-Related OT Security Risks

As a cybersecurity practitioner, you may be wondering what you can do to prepare yourself and your organization for the potential impact of COVID-19, aka coronavirus? The post Mitigating the Potential Impact ...
The Role of OT & IoT Visibility in Physical and Cyber Environments

The Role of OT & IoT Visibility in Physical and Cyber Environments

A small 20-person rock crushing operation recently suffered a cyberattack that shut operations down for the day. The post The Role of OT & IoT Visibility in Physical and Cyber Environments appeared ...

New Anomaly Detection Accelerates OT and IoT Security

Security teams can’t completely defend systems against sophisticated cyberattacks, but visibility into these threats helps minimize security risks. The post New Anomaly Detection Accelerates OT and IoT Security appeared first on Nozomi ...

Industrial Cybersecurity Needs Broad & Deep OT/IoT Threat Visibility

Security teams can’t completely defend systems against sophisticated cyberattacks, but visibility into these threats helps minimize security risks. The post Industrial Cybersecurity Needs Broad & Deep OT/IoT Threat Visibility appeared first on ...

Industrial Operators on Alert in Wake of U.S. Cyberattack Warning

On January 4th, the U.S. Department of Homeland Security (DHS) issued a National Terrorism Advisory bulletin warning of a potential cyberattack by Iran in the wake of a U.S. drone attack that ...
Deep IBM Collaboration Delivers Unified IT and OT Cyber Security

Deep IBM Collaboration Delivers Unified IT and OT Cyber Security

Senior executives at industrial and OT organizations increasingly need to understand the full scope of their cyber risks. However, their confidence with current monitoring for OT/IoT systems is typically low. To help ...
Meet Guardian Community Edition – a Free Tool for OT & IoT Security

Meet Guardian Community Edition – a Free Tool for OT & IoT Security

Without visibility into your operational assets, you can’t answer three fundamental questions: what’s on your network, how are devices communicating, and is there anything connected to the internet that shouldn’t be? To ...
Nozomi-Networks-helps-mining-companies-protect-their-production-capacity-against-disruption-BLOG

The Three Most Common Mining Industry Cyber Threats

The mining industry is embracing digital transformation, but it comes at a cost: an increasingly connected operating environment exponentially expands the threat surface. This makes mining operations more vulnerable to cyber threats, ...
Two-Steps-to-Adopting-Cyber-Security-Standards-for-Manufacturing-BLOG

Two Steps to Adopting Cyber Security Best Practices for Manufacturing

The manufacturing environment is changing fast. Digital transformation promises substantial increases in productivity, speed and quality. Securing modern manufacturing is essential to safety and uptime. Fortunately, guidelines such as the NIST Cybersecurity ...