A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Because of the criticality of remaining operational, industrial companies and utilities are far more likely to pay, attracting even more threat groups and a focus on OT systems.
Historically, the financial services sector has been the most attacked by cybercriminals. Still, in 2021 there was a substantial shift, and a different industry ranked at the top for the first time – the manufacturing industry.
When industrial environments integrated connected systems into their assets, attack surfaces are expanded, opening once-closed critical infrastructure sites and the companies that manage them to attacks from threat actors.
As a result of this shift from the IT to OT landscape, the C-suite must educate themselves and drive change into the organization to ensure a robust cybersecurity program is in place that addresses OT separately from IT.
Operational technology (OT) networks control the devices critical to the continued operations of production lines, power plants, and energy supplies, and as such are typically segmented from a company’s internet-facing IT networks to better isolate critical hardware from cyberattacks. Now security researchers are warning of the risks posed by the embedded devices that sit on those OT networks.
The critical infrastructure and healthcare industries are key targets for cyberattacks because of their extensive use of cyber-physical systems. Here are best practices for cyber-physical security.
Recent warnings about advanced persistent threats from China against critical infrastructure suggest a shift in goals, but other nation-state adversaries have their own agendas.
How to ensure cybersecurity in the operational technology environment, at a time of increasing digitalization and convergence of the OT and IT environments.
Here’s how OT cybersecurity practitioners should protect their industrial environments to improve security posture and meet insurance coverage requirements.
While securing OT systems can seem overwhelming…the task is not impossible. The power of attack surface management provides the technology needed to lock down assets in your organization.
Innovation in Industrial Control Systems (ICS) may well be helping businesses get the best from their data, but it’s also helping cyber attackers see new ways to attack these critical systems.
OT involves a collection of dedicated systems and physics, and that creates distinct security requirements, said Robert M. Lee, CEO and co-founder at Dragos.
A cyberattack on Amsterdam-Rotterdam-Antwerp (ARA) will have cascading effects across Europe and shows collaboration is needed to challenge future attacks.
According to a report released by Honeywell, 71% of surveyed facility managers in the US, Germany, and China consider OT cybersecurity a concern or worry
Far from sensationalizing ransomware attacks, our response should be to return to the basics of cybersecurity. This requires a converged IT-OT security strategy to limit damage and protect valuable assets.
A cybersecurity solution in business IT, often requiring the use of active components and intrusive techniques, may be highly unsuitable for industrial systems and networks. Not only will it fail to recognize specific industrial protocols and interactions.
To get content containing either thought or leadership enter:
To get content containing both thought and leadership enter:
To get content containing the expression thought leadership enter:
You can enter several keywords and you can refine them whenever you want. Our suggestion engine uses more signals but entering a few keywords here will rapidly give you great content to curate.