A "road map to resilience" approach helps organizations balance immediate, low-cost security improvements with complex, long-term risk reduction initiatives in industrial control systems, said Mex Martinot, vice president and global head of industrial cybersecurity at Siemens Energy.
Critical infrastructure encompasses the essential services and assets vital to the functioning of society and the economy. Specializing in security in this field requires a deep understanding of the challenges and threats facing sectors such as energy, transportation, healthcare and water systems.
Anthony Perry, director IT and OT/IoT security at FedEx, shared strategies for developing robust OT security programs. At FedEx, the focus on OT and IoT security has grown over the past several years, driven by the need to protect the company's automation processes, Perry said.
The Port Authority of New York and New Jersey is a major transportation hub that oversees regional infrastructure. Initially lacking an OT security program, John Ballentine of PANYNJ recognized the need to adapt security strategies to the unique demands of operational technology environments.
Censys CEO Brad Brooks discussed the alarming reality of heightened cyberthreats and how organizations are reassessing their cybersecurity needs when shopping for cyber insurance, seeking solutions that align with their evolving security strategies.
Microsoft has released a new open-source security tool to close gaps in threat analysis for industrial control systems and help address increased nation-state attacks on critical infrastructure. ICSpector, available on GitHub, can scan PLCs, extract information and detect malicious code.
In Part 2 of this panel discussion, practitioners from the transportation, manufacturing and water distribution sectors discussed cyberthreats and physical security in the OT world. Panelists shared how to overcome challenges including security awareness, legacy technology and change management.
The Energy Department is hoping to catalyze next-generation solutions to cybersecurity vulnerabilities in the energy sector by funding the creation of university-based cyber energy centers nationwide that will bring together private sector partners and the future of U.S. cyber talent.
A security researcher identified a new Linux-based malware named GTPDOOR, designed for deployment in telecom networks adjacent to GPRS roaming exchanges.
Network anomalies and attacks topped the threat list to OT and IoT environments accounting for the highest portion of the threat at 38%, telemetry from Nozomi Networks Labs revealed. The research also reported a 230% surge in vulnerabilities within critical manufacturing.
Russia continues to focus on running cyber operations and espionage that target Ukraine's military, government and civil society in support of its ground campaign, researchers at Google said, warning that the information operations will likely soon be brought to bear on Western elections.
Here's one reason why Iranian state hackers may have been able to target Israeli-made pressure-monitoring controllers used by American water systems: Nearly 150 of the controllers are exposed to the internet - and some still use the default password 1111.
Leaders from the U.S. water sector testified to the House Subcommittee on Environment, Manufacturing and Critical Materials that entities across the country face funding and resource disparities as emerging threats from domestic and foreign cyber actors target the increasingly vulnerable industry.
Two major water providers in the U.S. and U.K. report that they recently fell victim to ransomware attacks. In both cases, attackers appear to have stolen employee or customer data that they're now holding to ransom. Ransomware trackers say known attacks, affecting all sectors, have been surging.
Russian-speaking ransomware hackers may be responsible for deploying malware onto the network of an electric utility in southern Africa in an attack researchers say underscores heightened risks of industrial ransomware attacks. An unknown actor deployed a variant of SystemBC malware dubbed DroxiDat.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ot.today, you agree to our use of cookies.