A Quick Guide to Using the ONG-C2M2 Model

The Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (ONG-C2M2) can help oil and natural gas (ONG) organizations evaluate their cybersecurity programs and make improvements. These tools allow owners and operators in the electricity and ONG sectors to assess their cybersecurity capabilities. Additionally, the tool can inform individuals on how to address their needs […]

The post A Quick Guide to Using the ONG-C2M2 Model appeared first on Security Intelligence.

Continue reading A Quick Guide to Using the ONG-C2M2 Model

Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

The combination of digital transformation and the “Internet of Everything” is reshaping the modern landscape of OT, IoT and IoMT, meaning threat management must evolve in response.

The post Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT appeared first on Security Intelligence.

Continue reading Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

New Destructive Wiper ZeroCleare Targets Energy Sector in the Middle East

According to IBM X-Force research, the ZeroCleare wiper was used to execute a destructive attack that affected organizations in the energy and industrial sectors in the Middle East.

The post New Destructive Wiper ZeroCleare Targets Energy Sector in the Middle East appeared first on Security Intelligence.

Continue reading New Destructive Wiper ZeroCleare Targets Energy Sector in the Middle East

Cybersecurity Leaders From Maersk and Westfield Insurance Discuss Digital Transformation at Major Industry Event

IBM Security General Manager Mary O’Brien sat down for a fireside chat with Kevin Baker, CISO of Westfield Insurance, and Maersk CISO Andy Powell about how digital transformation impacts security.

The post Cybersecurity Leaders From Maersk and Westfield Insurance Discuss Digital Transformation at Major Industry Event appeared first on Security Intelligence.

Continue reading Cybersecurity Leaders From Maersk and Westfield Insurance Discuss Digital Transformation at Major Industry Event

Cybersecurity breaches in 2018: What We Learned

In 2018 technology touches nearly every aspect of our life. But no innovation seems to come without some form of drawback or compromise. While technology has undoubtedly improved most of our lives, it has also brought new risks that we all find a way t… Continue reading Cybersecurity breaches in 2018: What We Learned

How an IoT Botnet Could Breach the Power Grid and Cause Widespread Blackouts

A group of researchers from Princeton revealed that, through an attack dubbed MadIoT, threat actors could leverage an IoT botnet to compromise the power grid and cause widespread blackouts.

The post How an IoT Botnet Could Breach the Power Grid and Cause Widespread Blackouts appeared first on Security Intelligence.

Continue reading How an IoT Botnet Could Breach the Power Grid and Cause Widespread Blackouts

What Can We All Learn From the U.S. Department of Energy’s Cybersecurity Strategy?

The U.S. Department of Energy’s “Cybersecurity Strategy” document contains key principles and processes that can help organizations in all sectors improve their security posture.

The post What Can We All Learn From the U.S. Department of Energy’s Cybersecurity Strategy? appeared first on Security Intelligence.

Continue reading What Can We All Learn From the U.S. Department of Energy’s Cybersecurity Strategy?

At Your Own Risk: Managing Internet of Things (IoT) Risks for Industrial and Utility Companies

A new IBM Institute of Business Value (IBV) report found that many energy and utilities companies are unprepared to deal with Internet of Things (IoT) threats.

The post At Your Own Risk: Managing Internet of Things (IoT) Risks for Industrial and Utility Companies appeared first on Security Intelligence.

Continue reading At Your Own Risk: Managing Internet of Things (IoT) Risks for Industrial and Utility Companies

Year in Review: How Did the Cyberthreat Landscape Change in 2017?

Over the course of 2017, the cyberthreat landscape shifted to accommodate a sharper focus on pure data destruction for the sake of disruption rather than monetary gain.

The post Year in Review: How Did the Cyberthreat Landscape Change in 2017? appeared first on Security Intelligence.

Continue reading Year in Review: How Did the Cyberthreat Landscape Change in 2017?

Addressing Common Vulnerabilities and Security Gaps in the Oil and Gas Industry

To close common security gaps in the oil and gas industry, IT leaders should educate employees, better manage remote devices and eschew standard products.

The post Addressing Common Vulnerabilities and Security Gaps in the Oil and Gas Industry appeared first on Security Intelligence.

Continue reading Addressing Common Vulnerabilities and Security Gaps in the Oil and Gas Industry