A Quick Guide to Using the ONG-C2M2 Model

The Oil and Natural Gas Subsector Cybersecurity Capability Maturity Model (ONG-C2M2) can help oil and natural gas (ONG) organizations evaluate their cybersecurity programs and make improvements. These tools allow owners and operators in the electricity and ONG sectors to assess their cybersecurity capabilities. Additionally, the tool can inform individuals on how to address their needs […]

The post A Quick Guide to Using the ONG-C2M2 Model appeared first on Security Intelligence.

Continue reading A Quick Guide to Using the ONG-C2M2 Model

Gain Visibility Into Operational Technology (OT) Environments With a Combined SOC

Organizations can attain visibility into their operational technology (OT) environments by building out a combined OT/IT security operations center.

The post Gain Visibility Into Operational Technology (OT) Environments With a Combined SOC appeared first on Security Intelligence.

Continue reading Gain Visibility Into Operational Technology (OT) Environments With a Combined SOC

Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

The combination of digital transformation and the “Internet of Everything” is reshaping the modern landscape of OT, IoT and IoMT, meaning threat management must evolve in response.

The post Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT appeared first on Security Intelligence.

Continue reading Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

Leverage ATT&CK for ICS to Secure Industrial Control Systems

The core of MITRE ATT&CK for ICS provides an overview of the TTPs associated with threat actors that have carried out attacks against ICS systems.

The post Leverage ATT&CK for ICS to Secure Industrial Control Systems appeared first on Security Intelligence.

Continue reading Leverage ATT&CK for ICS to Secure Industrial Control Systems

What the Explosive Growth in ICS-Infrastructure Targeting Means for Security Leaders

The IBM X-Force Threat Intelligence Index 2020 found that industrial control systems became a popular target for specialized actors in 2019. Find out what this means for the future of cybersecurity.

The post What the Explosive Growth in ICS-Infrastructure Targeting Means for Security Leaders appeared first on Security Intelligence.

Continue reading What the Explosive Growth in ICS-Infrastructure Targeting Means for Security Leaders

Securing the Industrial Internet of Things in the Utilities Sector

Reading Time: 4 minutes While the industrial internet of things has clear benefits, IIoT environments also have the potential to expose high-value assets or services to a larger attack surface.

The post Securing the Industrial Internet of Things in the Utilities Sector appeared first on Security Intelligence.

Continue reading Securing the Industrial Internet of Things in the Utilities Sector

Industrial Control Systems Security: To Test or Not to Test?

According to X-Force Red data, the number of vulnerabilities exposing industrial control systems has increased 83 percent since 2011. Should organizations test them and risk destabilizing operations?

The post Industrial Control Systems Security: To Test or Not to Test? appeared first on Security Intelligence.

Continue reading Industrial Control Systems Security: To Test or Not to Test?

To Improve Critical Infrastructure Security, Bring IT and OT Together

Strong collaboration between IT and OT is a critical step in improving the security of critical infrastructure systems.

The post To Improve Critical Infrastructure Security, Bring IT and OT Together appeared first on Security Intelligence.

Continue reading To Improve Critical Infrastructure Security, Bring IT and OT Together

Cross-Industry Approaches to Managing Potentially Catastrophic Cyber Risks

In the security industry there is a range of cyber risks that can cause catastrophic damage to a business. What can we learn from other industries that manage these kinds of risks?

The post Cross-Industry Approaches to Managing Potentially Catastrophic Cyber Risks appeared first on Security Intelligence.

Continue reading Cross-Industry Approaches to Managing Potentially Catastrophic Cyber Risks

How an IoT Botnet Could Breach the Power Grid and Cause Widespread Blackouts

A group of researchers from Princeton revealed that, through an attack dubbed MadIoT, threat actors could leverage an IoT botnet to compromise the power grid and cause widespread blackouts.

The post How an IoT Botnet Could Breach the Power Grid and Cause Widespread Blackouts appeared first on Security Intelligence.

Continue reading How an IoT Botnet Could Breach the Power Grid and Cause Widespread Blackouts