SCADA: Changing the Dynamic

How do we build a truly resilient security framework directly incorporating micro segmentation into the SCADA systems and our network in order to protect it, when we can’t add security controls for fear of the business consequences? I think the solution is quite obvious on the surface: change the dynamic that has existed within our […]

The post SCADA: Changing the Dynamic appeared first on Radware Blog.

Continue reading SCADA: Changing the Dynamic

The World is Changing

The world is changing; it always has but the world is changing faster now than it ever has before. This general change is translating into even bigger changes in the cyber world. Some of the key areas that are evolving aren’t new, like availability or security. Others like automation are maturing quickly, and then there […]

The post The World is Changing appeared first on Radware Blog.

Continue reading The World is Changing

Every Digital Yin has a Physical Yang

In the year 1453, the Ottoman Empire under Sultan Mehmed II was able to accomplish what none before them had ever been able to achieve. For more than a millennium, Byzantium had remained a bastion of the Orthodox faith, the great kingdom of the East. The hordes and barbarians that had caused the downfall of […]

The post Every Digital Yin has a Physical Yang appeared first on Radware Blog.

Continue reading Every Digital Yin has a Physical Yang

Cloud WAF: Why a Checkbox Isn’t Enough

I remember when I first learned about Web application firewall technology. It seemed like magic to me: A device that could compensate for bad coding or unexpected/unintended web application functionality. It could do this by learning expected application behavior and then enforcing said behavior, even if the application itself was capable of allowing the unwanted […]

The post Cloud WAF: Why a Checkbox Isn’t Enough appeared first on Radware Blog.

Continue reading Cloud WAF: Why a Checkbox Isn’t Enough

SCADA Part 4: The Network in Focus

In this blog post we will cover the basics of building a truly resilient network where throughput isn’t always important, but reliability and redundancy are. We will look at this from the operators’ stand point. Why must we be resilient? There are two broad reasons: 1. If it is critical infrastructure (transportation, power grids, oil […]

The post SCADA Part 4: The Network in Focus appeared first on Radware Blog.

Continue reading SCADA Part 4: The Network in Focus

SCADA Part 3: Mission critical, highly vulnerable, almost un-protectable.

I’m back with another exciting installment on SCADA security. Today I want to cover authentication and System redundancy. It should be obvious, but authentication takes on an even more important role in securing SCADA environments. If you can’t protect the traffic coming in, you should at least ensure that the traffic is coming from a […]

The post SCADA Part 3: Mission critical, highly vulnerable, almost un-protectable. appeared first on Radware Blog.

Continue reading SCADA Part 3: Mission critical, highly vulnerable, almost un-protectable.

SCADA Part 2: Mission critical, highly vulnerable, almost un-protectable.

Hey folks, I’m back with my second installment on protecting the un-protectable: Last week we discussed the SCADA environment and some of the unique business and technology challenges we face when trying to secure it both from availability and cyber security hazards. The questions you are all asking yourself now are “how did we get […]

The post SCADA Part 2: Mission critical, highly vulnerable, almost un-protectable. appeared first on Radware Blog.

Continue reading SCADA Part 2: Mission critical, highly vulnerable, almost un-protectable.

SCADA Part 2: Mission critical, highly vulnerable, almost un-protectable.

Hey folks, I’m back with my second installment on protecting the un-protectable: Last week we discussed the SCADA environment and some of the unique business and technology challenges we face when trying to secure it both from availability and cyber security hazards. The questions you are all asking yourself now are “how did we get […]

The post SCADA Part 2: Mission critical, highly vulnerable, almost un-protectable. appeared first on Radware Blog.

Continue reading SCADA Part 2: Mission critical, highly vulnerable, almost un-protectable.

SCADA: Mission critical, highly vulnerable, almost un-protectable.

In today’s world when most of us think about IT infrastructure, we think about the traditional environments that have firewalls, switches, routers, standard operating systems and all the associated security. We think of internet applications like Facebook, LinkedIn, eBay, SalesForce and Amazon, etc. What we don’t think of is the SCADA environment; Networks and systems […]

The post SCADA: Mission critical, highly vulnerable, almost un-protectable. appeared first on Radware Blog.

Continue reading SCADA: Mission critical, highly vulnerable, almost un-protectable.