ICS
-
Connected Plant
A Grim Gap: Cybersecurity of Level 1 Field Devices
Industrial control system cybersecurity is today largely focused on securing networks, and efforts largely ignore process control equipment that is crucial for plant safety and reliability, leaving it woefully
-
IIOT
CyberX Receives U.S. Technology Patent for ICS Threat Monitoring Analytics
CyberX Technology Recognized as Innovative for Advanced Behavioral Analytics and Machine Learning Algorithms to Accurately Detect Industrial Cyber Risk BOSTON, January 9, 2018 – CyberX, the IIoT and industrial control system (ICS) security company, today announced that it was awarded a patent (U.S. Patent 10,015,188) by the U.S. Patent and Trademark Office for its innovative, […]
Tagged in: -
Cybersecurity
Three Things ICS Security Pros Can Do to Maximize Uptime
Before industrial control systems (ICSs) were network-connected, operators had little to worry about in the way of cyber threats. But as industrial environments, such as energy utilities, become more connected, they’re exposed to vulnerabilities and attacks. ICSs are used in large amounts of critical infrastructure, including the electrical grid, transportation systems, and wastewater plants. How […]
-
Connected Plant
Cyber Breaches: Is Fear Misplaced?
The power sector’s terror of a debilitating cybersecurity attack is magnified seemingly every day as new vulnerabilities or destructive threat actors are identified. But according to several industrial
-
IIOT Aerospace
Bill Codifying Federal Role in ICS Cybersecurity Clears House
A bill codifying the Department of Homeland Security’s (DHS’s) role in addressing industrial control systems (ICS) cybersecurity has cleared the U.S. House of Representatives. While H.R. 5733, “DHS Industrial Control Systems Capabilities Enhancement Act,” contains no mandates for the private sector, it directs the DHS’s National Cybersecurity and Communications Integration Center (NCCIC) to develop and maintain […]
Tagged in: -
IIOT Cyber
Securing Industrial Control Systems: A Holistic Defense-In-Depth Approach
Defense-in-depth is a concept that is already widely deployed by many organizations within their IT infrastructures. However, many organizations do not apply it to their industrial control system (ICS) operations, owing mostly to obscure protocols. But as IT and ICS architectures converge and high-profile cybersecurity incidents mount, a robust, holistic defense-in-depth solution may be […]
-
Instrumentation & Controls
Russian Cyber Threat Actors Have Gained Access to Power Plant ICS Systems
Russian government cyber threat actors have infiltrated workstations and servers of corporate networks containing data output from industrial control systems (ICS) or supervisory control and data acquisition (SCADA) systems associated with an unnamed number of power plants, the Department of Homeland Security (DHS) has warned. The dire warning issued by the agency’s U.S. Computer Emergency […]
-
IIOT Power
DHS, FBI Identify Tactics in Cyberattack Campaign Targeting Industrial Control Systems
The Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) warned in an e-mail on October 20 that an ongoing cyberattack campaign is targeting the nuclear, energy, and other critical infrastructure sectors since at least May 2017—with results ranging from cyber espionage to the ability to disrupt energy systems in the event of […]
-
Connected Plant
Malware in Modern ICS: Understanding Impact While Avoiding Hype
Understanding the threat posed to industrial control systems (ICSs) by malware is difficult. It requires knowledge of proper ICS functionality in order to identify illegitimate software. One industrial
-
Press Releases
Kaspersky Lab Discovers Vulnerable Industrial Control Systems Likely Belonging to Large Organizations
The Majority of ICS Components Connected to the Internet Are Located in the United States and Europe WOBURN, Mass.–(BUSINESS WIRE)–Kaspersky Lab released its report on the Industrial Control Systems (ICS) threat landscape, which revealed that large organizations likely have ICS components connected to the internet that could allow cybercriminals to attack critical infrastructure systems. The […]