CISA, NSA Lay Out Recommendations for Protecting OT Assets

CISA, NSA Lay Out Recommendations for Protecting OT Assets

The Cybersecurity & Infrastructure Security Agency (CISA) and the National Security Agency (NSA) laid out a series of recommendations for critical infrastructure owners and operators to protect their operational technology (OT) assets ...

Zero Trust in the IoT/OT Space

Zero Trust is definitely not new but around for something like 16 years if you look at it. This is, when the Jericho Forum was formally established and Network Access Control architectures ...
manufacturing remote

Manufacturing Also Faces Remote Working Security Risks

Threats to the operational technology network in manufacturing facilities during remote work are high considerations in the time of COVID-19 When talking about security risks due to COVID-19, much of the discussion ...
Security Boulevard

Navigating ICS Security: Having your Action Plan Ready

| | CMA, ICS, ICS Security, OT
Trust, respect, understanding. These are all two-way relationships that must be earned over time. Whilst someone being hired in a senior position will likely already have a certain level of each, part ...
via    the respected information security capabilities of   Robert M. Lee     & the superlative illustration talents of   Jeff Haas   at   Little Bobby Comics  .

Robert M. Lee’s & Jeff Haas’ Little Bobby Comics, ‘Don’t’

via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics. Permalink ...
8 Top Technical Resource Providers for ICS Security Professionals

8 Top Technical Resource Providers for ICS Security Professionals

Organizations are increasingly preoccupied with strengthening the digital security of their industrial control systems (ICS). They no doubt heard FireEye reveal that it had detected a second intrusion by the same actor ...
IoT

IT Joins OT in the Control Center

Increasingly in industrial environments, IT and OT must work together to ensure end-to-end security If you glance at the minutes of a boardroom meeting for a large energy or manufacturing company, often ...
Security Boulevard
TRITON Framework Leveraged at a Second Critical Infrastructure Facility

TRITON Framework Leveraged at a Second Critical Infrastructure Facility

Researchers have discovered that malicious actors leveraged the TRITON framework at a second critical infrastructure facility. In this particular attack, the threat actor maintained access to the target corporate networks for nearly ...
Security Challenges for ICS, OT

Meeting the Security Challenges for ICS, OT

Operational technology (OT) makes our factories run and ensures the critical infrastructure can fulfill its services. Yet, when we talk about manufacturing and systems in terms of cybersecurity, the focus tends to ...
Security Boulevard

Tripwire & NCCoE Collaborate on the Energy Sector Asset Management Project

| | Energy, ICS Security, IT, NCCoE, OT, security
Eight companies including Tripwire have been selected by the National Cybersecurity Center of Excellence (NCCoE) to collaborate on the Energy Sector Asset Management Project. The NCCoE is a part of the National ...