Operational technology asset visibility fuels a capable cybersecurity program

New report offers insights into the vital role of asset visibility in protecting the entire operational technology environment.

The post Operational technology asset visibility fuels a capable cybersecurity program appeared first on CyberScoop.

Continue reading Operational technology asset visibility fuels a capable cybersecurity program

Combatting emerging-malware aimed at industrial control systems

New report offers insights on CHERNOVITE and the PIPEDREAM malware that threatens industrial control systems.

The post Combatting emerging-malware aimed at industrial control systems appeared first on CyberScoop.

Continue reading Combatting emerging-malware aimed at industrial control systems

New security threats target industrial control and OT environments

A new Dragos report highlights recent threats targeting industrial control systems and operational technology environments and identifies strategies to address them.

The post New security threats target industrial control and OT environments appeared first on CyberScoop.

Continue reading New security threats target industrial control and OT environments

How to improve threat detection in ICS environments

A challenge in industrial control systems (ICS) cybersecurity is the lack of detection and collection capability within most ICS environments. Security leaders can struggle to piece together the complete attack chain in actual ICS incidents because the environments cannot collect the required evidence. A new report, “2021 MITRE Engenuity ATT&CK Evaluations for ICS,” produced by Dragos, evaluates the ICS threat detection market and shows a realistic demonstration of an attack against an operational technology environment. This report details the purpose of the ATT&CK evaluations for ICS and the lessons learned from the evaluation results, including: How the MITRE ATT&CK for ICS framework was developed A breakdown of the ATT&CK Evaluations for the ICS scenario, including the emulated attack approach and the ICS environment The ATT&CK Evals results and how Dragos performed Benefits to the ICS cybersecurity community Learn more on the ATT&CK Evaluations and how to accelerate digital transformation securely to manage growing risks to protect core business operations. This article was produced by CyberScoop […]

The post How to improve threat detection in ICS environments appeared first on CyberScoop.

Continue reading How to improve threat detection in ICS environments

New research analyzes industrial cybersecurity maturity

As the frequency and severity of cyberattacks on industrial organizations increase, defenders struggle to keep ahead of threats. Security leaders know that a unified IT and operational technology (OT) approach is key to protecting the safety and availability of operations but are faced with cultural and technical differences between IT best practices and OT. A new report, “The 2021 State of Industrial Cybersecurity,” produced by the Ponemon Institute — sponsored by Dragos — reveals key challenges industrial organizations face today and provides actionable solutions on how they can mature their cybersecurity strategies. The report covers: Cybersecurity maturity level for industrial control systems (ICS) and OT How organizations secure their ICS/OT OT cybersecurity investment, priorities and accountability The cause and consequences of an ICS/OT ransomware and cybersecurity incident Learn more on building a unified strategy that secures both IT and OT environments.  This article was produced by CyberScoop for, and sponsored by, […]

The post New research analyzes industrial cybersecurity maturity appeared first on CyberScoop.

Continue reading New research analyzes industrial cybersecurity maturity