Leaky Apps Heighten Supply Chain Risk

Securing the apps that businesses and individuals have come to rely on, particularly during the pandemic, has become a multidimensional challenge. Recent research underscored the need to more tightly knit DevOps together with SecOps early in the devel… Continue reading Leaky Apps Heighten Supply Chain Risk

Overcoming IoT Asset Management Challenges

The ability to track anything — from the level of coffee left in your pot to a real-time inventory of goods in a warehouse — is compelling in any industry. With the number of IoT devices expected to reach 55.7 billion worldwide by 2025, security teams… Continue reading Overcoming IoT Asset Management Challenges

Speeding IT Visibility into OT: New Integrations with Fortinet

Fortinet and Nozomi Networks achieve another partnership milestone with two new integrations that help eliminate the gap between IT and OT. Now Nozomi Networks Guardian is now comprehensively integrated with FortiGate, FortiNAC, and FortiSIEM.
Learn ho… Continue reading Speeding IT Visibility into OT: New Integrations with Fortinet

Nozomi Networks Cyber Security Solution Embedded in RUGGEDCOM

Nozomi Networks is bundling its real-time ICS cyber security and visibility solution on the new RUGGEDCOM RX15xx Multi-Service Platform from Siemens AG.
Read on to learn how this industrial networking platform with embedded security improves operationa… Continue reading Nozomi Networks Cyber Security Solution Embedded in RUGGEDCOM

Black Hat: The Future of Securing Power Grid Intelligent Devices

Today at Black Hat USA we’re presenting an innovative power grid cyber security solution that greatly improves monitoring of intelligent electronic devices (IEDs).
Using the IEC 62351 standard for monitoring industrial networks, we demonstrate h… Continue reading Black Hat: The Future of Securing Power Grid Intelligent Devices

Oil & Gas Cybersecurity and Process Safety Converge Thanks to TRITON

Thanks to TRITON, the Oil and Gas industry became ground zero for the convergence of SIS process safety and ICS cybersecurity.
Read on to learn why a unified approach to monitoring control system and process safety assets is now mission critical, and w… Continue reading Oil & Gas Cybersecurity and Process Safety Converge Thanks to TRITON

Xage brings role-based single sign-on to industrial devices

Traditional industries like oil and gas and manufacturing often use equipment that was created in a time when remote access wasn’t a gleam in an engineer’s eye, and hackers had no way of connecting to them. Today, these devices require remote access and some don’t have even rudimentary authentication. Xage, the startup that wants to […] Continue reading Xage brings role-based single sign-on to industrial devices

Schneider Electric Patches Critical RCE Vulnerability

Researchers found a critical remote code execution vulnerability afflicting two Schneider Electric products that could give attackers to disrupt or shut down plant operations.
Continue reading Schneider Electric Patches Critical RCE Vulnerability

Programs Controlling ICS Robotics Are ‘Wide Open’ to Vulnerabilities

Dewan Chowdhury, founder of MalCrawler, talks at SAS about the risks that companies face when securing their industrial control systems and robotics. Continue reading Programs Controlling ICS Robotics Are ‘Wide Open’ to Vulnerabilities