Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

The combination of digital transformation and the “Internet of Everything” is reshaping the modern landscape of OT, IoT and IoMT, meaning threat management must evolve in response.

The post Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT appeared first on Security Intelligence.

Continue reading Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

New Destructive Wiper ZeroCleare Targets Energy Sector in the Middle East

According to IBM X-Force research, the ZeroCleare wiper was used to execute a destructive attack that affected organizations in the energy and industrial sectors in the Middle East.

The post New Destructive Wiper ZeroCleare Targets Energy Sector in the Middle East appeared first on Security Intelligence.

Continue reading New Destructive Wiper ZeroCleare Targets Energy Sector in the Middle East

Pixeom raises $15M for its software-defined edge computing platform

Pixeom, a startup that offers a software-defined edge computing platform to enterprises, today announced that it has raised a $15M funding round from Intel Capital, National Grid Partners and previous investor Samsung Catalyst Fund. The company plans to use the new funding to expands its go-to-market capacity and invest in product development. If the Pixeom […] Continue reading Pixeom raises $15M for its software-defined edge computing platform

How an IoT Botnet Could Breach the Power Grid and Cause Widespread Blackouts

A group of researchers from Princeton revealed that, through an attack dubbed MadIoT, threat actors could leverage an IoT botnet to compromise the power grid and cause widespread blackouts.

The post How an IoT Botnet Could Breach the Power Grid and Cause Widespread Blackouts appeared first on Security Intelligence.

Continue reading How an IoT Botnet Could Breach the Power Grid and Cause Widespread Blackouts

What Can We All Learn From the U.S. Department of Energy’s Cybersecurity Strategy?

The U.S. Department of Energy’s “Cybersecurity Strategy” document contains key principles and processes that can help organizations in all sectors improve their security posture.

The post What Can We All Learn From the U.S. Department of Energy’s Cybersecurity Strategy? appeared first on Security Intelligence.

Continue reading What Can We All Learn From the U.S. Department of Energy’s Cybersecurity Strategy?

At Your Own Risk: Managing Internet of Things (IoT) Risks for Industrial and Utility Companies

A new IBM Institute of Business Value (IBV) report found that many energy and utilities companies are unprepared to deal with Internet of Things (IoT) threats.

The post At Your Own Risk: Managing Internet of Things (IoT) Risks for Industrial and Utility Companies appeared first on Security Intelligence.

Continue reading At Your Own Risk: Managing Internet of Things (IoT) Risks for Industrial and Utility Companies

Year in Review: How Did the Cyberthreat Landscape Change in 2017?

Over the course of 2017, the cyberthreat landscape shifted to accommodate a sharper focus on pure data destruction for the sake of disruption rather than monetary gain.

The post Year in Review: How Did the Cyberthreat Landscape Change in 2017? appeared first on Security Intelligence.

Continue reading Year in Review: How Did the Cyberthreat Landscape Change in 2017?

Addressing Common Vulnerabilities and Security Gaps in the Oil and Gas Industry

To close common security gaps in the oil and gas industry, IT leaders should educate employees, better manage remote devices and eschew standard products.

The post Addressing Common Vulnerabilities and Security Gaps in the Oil and Gas Industry appeared first on Security Intelligence.

Continue reading Addressing Common Vulnerabilities and Security Gaps in the Oil and Gas Industry

Addressing the Clear and Present Danger of an Electrical Power Grid Breach

Government agencies and companies in the energy and utilities sector must replace legacy equipment to avoid a potentially devastating power grid breach.

The post Addressing the Clear and Present Danger of an Electrical Power Grid Breach appeared first on Security Intelligence.

Continue reading Addressing the Clear and Present Danger of an Electrical Power Grid Breach

Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges

Security leaders in the health care, financial services, and energy and utilities sectors must pay special attention to industry-specific security risks.

The post Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges appeared first on Security Intelligence.

Continue reading Vulnerabilities Across Verticals: Overcoming Industry-Specific Security Challenges