Roundup: 2021 Energy & Utility Data Breaches and Defenses in the News

Ransomware is evolving. How long until it takes down operational technology? In May 2021, Colonial Pipeline, one of the largest fuel pipelines in the United States, faced a ransomware attack. The company, which transports more than 100 million gallons of gasoline and other fuel daily from Houston to the New York Harbor, shut down work […]

The post Roundup: 2021 Energy & Utility Data Breaches and Defenses in the News appeared first on Security Intelligence.

Continue reading Roundup: 2021 Energy & Utility Data Breaches and Defenses in the News

The Weaponization of Operational Technology

Given the accelerating rise in operational technology (OT) threats, this blog will address some of the most common threats IBM Security X-Force is observing against organizations with OT networks, including ransomware and vulnerability exploitation. IBM will also highlight several measures that can enhance security for OT networks based on insights gained from the X-Force Red […]

The post The Weaponization of Operational Technology appeared first on Security Intelligence.

Continue reading The Weaponization of Operational Technology

A New Directive for Pipeline Operators Puts Cybersecurity in the Spotlight

It’s no secret that cyberattacks against critical infrastructure are increasing. The recent attacks against water treatment plants, pipelines, vital hospital systems and food processing facilities have all made recent headlines and demonstrate the vulnerability of all types of critical infrastructure providers. The attacks have caused chaos, value chain disruption and crippling fuel shortages, and we […]

The post A New Directive for Pipeline Operators Puts Cybersecurity in the Spotlight appeared first on Security Intelligence.

Continue reading A New Directive for Pipeline Operators Puts Cybersecurity in the Spotlight

What’s New in the 2021 Cost of a Data Breach Report

Has cybersecurity ever been more important than it is right now? Even in these extraordinary times, with its focus on manufacturing vaccines and getting shots into arms, new research in the Cost of a Data Breach Report shows that the increasing cost of security breaches makes preventing and responding to these threats a critical concern. […]

The post What’s New in the 2021 Cost of a Data Breach Report appeared first on Security Intelligence.

Continue reading What’s New in the 2021 Cost of a Data Breach Report

Poison in the Water: The Physical Repercussions of IoT Security Threats

I’d wager few people had ever heard of Oldsmar, Florida, prior to 2021. That all changed in February when the city made headlines. The reason? An Internet of things (IoT) security incident moved into the physical world.  A Tale of Lifted Lye Levels At 8 a.m. local time on February 5, 2021, an operator at […]

The post Poison in the Water: The Physical Repercussions of IoT Security Threats appeared first on Security Intelligence.

Continue reading Poison in the Water: The Physical Repercussions of IoT Security Threats

Shedding Light on the DarkSide Ransomware Attack

It has been well over a decade since cybersecurity professionals began warning about both nation-state and financially motivated cyber-kinetic attacks. Concerned about a cybersecurity threat that would have the potential to destroy physical assets and human lives, many looked to sound the alarm in industrial organizations, tracking the vulnerabilities that could lead to a compromise […]

The post Shedding Light on the DarkSide Ransomware Attack appeared first on Security Intelligence.

Continue reading Shedding Light on the DarkSide Ransomware Attack

Expert Interview: How to Secure Critical Infrastructure With Operational Technology

In April 2021, the U.S. government announced a new effort to protect industrial control systems (ICS) from cyberattacks. For the cybersecurity community, the announcement may come as no surprise. Vulnerabilities in critical infrastructure such as ICS and the operational technologies (OT) that run them have made frequent headlines. From public water system threats to research […]

The post Expert Interview: How to Secure Critical Infrastructure With Operational Technology appeared first on Security Intelligence.

Continue reading Expert Interview: How to Secure Critical Infrastructure With Operational Technology

Expert Interview: How to Secure Critical Infrastructure With Operational Technology

In April 2021, the U.S. government announced a new effort to protect industrial control systems (ICS) from cyberattacks. For the cybersecurity community, the announcement may come as no surprise. Vulnerabilities in critical infrastructure such as ICS and the operational technologies (OT) that run them have made frequent headlines. From public water system threats to research […]

The post Expert Interview: How to Secure Critical Infrastructure With Operational Technology appeared first on Security Intelligence.

Continue reading Expert Interview: How to Secure Critical Infrastructure With Operational Technology

Threat Actors’ Most Targeted Industries in 2020: Finance, Manufacturing and Energy

IBM Security’s annual X-Force Threat Intelligence Index uses data derived from across our teams and managed customers to gather insights about the topmost targeted industries every year, helping organizations manage risk and resource investment in their security programs. When it comes to managing digital risk and facing potential cyberattacks, each industry faces its own unique […]

The post Threat Actors’ Most Targeted Industries in 2020: Finance, Manufacturing and Energy appeared first on Security Intelligence.

Continue reading Threat Actors’ Most Targeted Industries in 2020: Finance, Manufacturing and Energy

Defending the Oil and Gas Industry Against Cyber Threats

The oil and gas industry is one of the most powerful financial sectors in the world, critical to global and national economies. Therefore, this industry is a valuable target for adversaries seeking to exploit Industrial Control Systems (ICS) vulnerabilities. As the recent increase in attacks against ICS demonstrates, adversaries with a specific interest in oil and […]

The post Defending the Oil and Gas Industry Against Cyber Threats appeared first on Security Intelligence.

Continue reading Defending the Oil and Gas Industry Against Cyber Threats