What IT Needs to Know about OT/IoT Security Threats in 2020

Find out what IT needs to know about OT/IoT security in 2020, including the most active threats, their techniques and recommendations for mitigations.
The post What IT Needs to Know about OT/IoT Security Threats in 2020 appeared first on Nozomi Networ… Continue reading What IT Needs to Know about OT/IoT Security Threats in 2020

Enhanced Product Security Incident Response Reduces Customer Risk

Nozomi Networks is quickly expanding to serve more and more industrial, critical infrastructure and operational technology sectors in countries around the globe.
The post Enhanced Product Security Incident Response Reduces Customer Risk appeared first… Continue reading Enhanced Product Security Incident Response Reduces Customer Risk

Secure Remote Access: Gain Control Over Home Office Network Activity

Secure remote access (SRA) is being widely used to rescue companies in danger of collapse and help others thrive. Continuous monitoring of remote activity and detection of anomalies related to stolen credentials is critical.
The post Secure Remote Acc… Continue reading Secure Remote Access: Gain Control Over Home Office Network Activity

Ripple20 – New Zero-Day Vulnerabilities Send Shockwaves Across IoT

Two things make Ripple20 IT/OT/IoT vulnerabilities especially concerning: the potential impact that can be achieved by their exploitation, and the difficulty of finding and tracking all instances of the vulnerable library.
The post Ripple20 – Ne… Continue reading Ripple20 – New Zero-Day Vulnerabilities Send Shockwaves Across IoT

The Remote Access Genie is Out of the Bottle – Protect Your OT Systems

CISOs are facing a big dilemma: keeping OT systems running 24/7 when employees are working from home and dependent on secure connectivity to function normally. Learn more.
The post The Remote Access Genie is Out of the Bottle – Protect Your OT Sy… Continue reading The Remote Access Genie is Out of the Bottle – Protect Your OT Systems

IEC 61850 Meets IEC 62351: Securing GOOSE Power Grid Weaknesses

Nozomi Networks CTO Moreno Carullo explains how IEC 62351-6 can be used to secure IEC 61850 GOOSE protocol defects & increase ICS security for substations.
The post IEC 61850 Meets IEC 62351: Securing GOOSE Power Grid Weaknesses appeared first on … Continue reading IEC 61850 Meets IEC 62351: Securing GOOSE Power Grid Weaknesses

Presidential Executive Order Impacts U.S. Power System OT-IoT Security

Nozomi Networks President & CEO Edgard Capdevielle explains how equipment manufactured by a company under control of a foreign adversary and equipment that poses a national security threat can’t be used in the US power grid.
The post Presiden… Continue reading Presidential Executive Order Impacts U.S. Power System OT-IoT Security

COVID-19 Chinoxy Backdoor: A Network Perspective

A prolific threat actor, active in Asia, sends documents to people in Kyrgyzstan about how the United Nations is helping to fight COVID-19.
Nozomi Networks Labs examines how network traffic analysis can detect this specific threat.
The post COVID-19 C… Continue reading COVID-19 Chinoxy Backdoor: A Network Perspective

OT/IoT Security Superheroes: Tackling the Remote Employee Challenge

While the world is grappling with the COVID-19 pandemic, nation-state and other threat actors are capitalizing on the climate of fear, uncertainty and doubt to find OT and IoT security gaps and orchestrate new cyberattacks.
The post OT/IoT Security Sup… Continue reading OT/IoT Security Superheroes: Tackling the Remote Employee Challenge