Critical infrastructure encompasses the essential services and assets vital to the functioning of society and the economy. Specializing in security in this field requires a deep understanding of the challenges and threats facing sectors such as energy, transportation, healthcare and water systems.
Defenders of operational technology environments should look beyond the technical controls and incident response plans they've put in place. They also need to consider how attackers might undermine confidence in the service itself, says Ian Thornton-Trump, CISO of Cyjax.
Microsoft has released a new open-source security tool to close gaps in threat analysis for industrial control systems and help address increased nation-state attacks on critical infrastructure. ICSpector, available on GitHub, can scan PLCs, extract information and detect malicious code.
In Part 2 of this panel discussion, practitioners from the transportation, manufacturing and water distribution sectors discussed cyberthreats and physical security in the OT world. Panelists shared how to overcome challenges including security awareness, legacy technology and change management.
In the first part of this panel discussion, practitioners from the transportation, manufacturing and water distribution sectors discuss business use cases and the challenges of digitizing OT infrastructure, which has become a necessity for business growth through digital transformation.
The White House convened state environmental, health and homeland security agencies Thursday as experts told ISMG water utilities across the country - particularly those in small, under-resourced communities - lack the funding and technical skills to implement federal cybersecurity recommendations.
Here's one reason why Iranian state hackers may have been able to target Israeli-made pressure-monitoring controllers used by American water systems: Nearly 150 of the controllers are exposed to the internet - and some still use the default password 1111.
Leaders from the U.S. water sector testified to the House Subcommittee on Environment, Manufacturing and Critical Materials that entities across the country face funding and resource disparities as emerging threats from domestic and foreign cyber actors target the increasingly vulnerable industry.
Two major water providers in the U.S. and U.K. report that they recently fell victim to ransomware attacks. In both cases, attackers appear to have stolen employee or customer data that they're now holding to ransom. Ransomware trackers say known attacks, affecting all sectors, have been surging.
The U.S. Cybersecurity and Infrastructure Security Agency published guidance for water and wastewater sector owners and operators to bolster their cyber defenses with comprehensive incident response plans and enhanced practices for sharing information with the federal government.
A U.S. federal watchdog said government agencies could better synchronize efforts to improve water and wastewater sector cybersecurity efforts and faulted the Cybersecurity and Infrastructure Security Agency for not coordinating well with the Environmental Protection Agency.
The U.S. Cybersecurity and Infrastructure Security Agency is investigating a cyberattack from an Iranian hacking group known as "Cyber Av3ngers" that targeted a small municipal water authority in Pennsylvania over its use of Israeli-owned software, according to officials.
The reliance on text bases in modern software development means Rockwell Automation can capitalize on generative AI's ability to read, produce and generate text. Having open text-based files and a domain-specific language made it easy for Rockwell to apply generative AI to FactoryTalk Design Studio.
Microsoft spent the past year testing how generative AI can boost productivity, accelerate learning curves and drive collaboration for itself, its partners and its customers. Microsoft infuses generative AI into every product it builds and now uses generative AI to build generative AI capabilities.
Poor visibility and the complexity of cloud environments are helping criminals exploit important blind spots in critical infrastructure and business, said NetWitness' Karim Abillama. He shared how defenders need to evolve their strategies to meet new threats from nation-state groups and criminals.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ot.today, you agree to our use of cookies.