Addressing growing concerns about cybersecurity in manufacturing

Manufacturing has become increasingly reliant on modern technology, including industrial control systems (ICS), Internet of Things (IoT) devices and operational technology (OT). While these innovations boost productivity and streamline operations, they’ve vastly expanded the cyberattack surface. According to the 2024 IBM Cost of a Data Breach report, the average total cost of a data breach in […]

The post Addressing growing concerns about cybersecurity in manufacturing appeared first on Security Intelligence.

Continue reading Addressing growing concerns about cybersecurity in manufacturing

2022 Industry Threat Recap: Manufacturing

It seems like yesterday that industries were fumbling to understand the threats posed by post-pandemic economic and technological changes. While every disruption provides opportunities for positive change, it’s hard to ignore the impact that global supply chains, rising labor costs, digital currency and environmental regulations have had on commerce worldwide. Many sectors are starting to […]

The post 2022 Industry Threat Recap: Manufacturing appeared first on Security Intelligence.

Continue reading 2022 Industry Threat Recap: Manufacturing

X-Force 2022 Insights: An Expanding OT Threat Landscape

This post was written with contributions from Dave McMillen. So far 2022 has seen international cyber security agencies issuing multiple alerts about malicious Russian cyber operations and potential attacks on critical infrastructure, the discovery of two new OT-specific pieces of malware, Industroyer2 and InController/PipeDream, and the disclosure of many operational technology (OT) vulnerabilities. The OT cyber threat landscape […]

The post X-Force 2022 Insights: An Expanding OT Threat Landscape appeared first on Security Intelligence.

Continue reading X-Force 2022 Insights: An Expanding OT Threat Landscape

Lessons Learned by 2022 Cyberattacks: X-Force Threat Intelligence Report

Every year, the IBM Security X-Force team of cybersecurity experts mines billions of data points to reveal today’s most urgent security statistics and trends. This year’s X-Force Threat Intelligence Index 2022 digs into attack types, infection vectors, top threat actors, malware trends and industry-specific insights.  This year, a new industry took the infamous top spot: […]

The post Lessons Learned by 2022 Cyberattacks: X-Force Threat Intelligence Report appeared first on Security Intelligence.

Continue reading Lessons Learned by 2022 Cyberattacks: X-Force Threat Intelligence Report

Where Everything Old is New Again: Operational Technology and Ghost of Malware Past

This post was written with contributions from IBM Security’s Sameer Koranne and Elias Andre Carabaguiaz Gonzalez. Operational technology (OT) — the networks that control industrial control system processes — face a more complex challenge than their IT counterparts when it comes to updating operating systems and software to avoid known vulnerabilities. In some cases, implementation […]

The post Where Everything Old is New Again: Operational Technology and Ghost of Malware Past appeared first on Security Intelligence.

Continue reading Where Everything Old is New Again: Operational Technology and Ghost of Malware Past

Ransomware Resilience Tops Findings in X-Force Threat Intelligence Index 2022

For the third year in a row, ransomware was the top attack type globally in 2021, despite some successes last year by law enforcement to take down ransomware groups. This was among the top findings of IBM Security’s latest research published in the tenth annual X-Force Threat Intelligence Index, a comprehensive overview of the global […]

The post Ransomware Resilience Tops Findings in X-Force Threat Intelligence Index 2022 appeared first on Security Intelligence.

Continue reading Ransomware Resilience Tops Findings in X-Force Threat Intelligence Index 2022

2021 Manufacturing and Supply Chain Security Roundup

In 2020, ransomware actors demanded $17 million from a laptop maker and $34 million from a Taiwanese electronics contract company. The past two years have also delivered major disruptions for supply chains. The pandemic pushed supply chain attack issues front-and-center, with disruptions up 67% in 2020 and problems expected to persist as global markets adjust to the ‘new […]

The post 2021 Manufacturing and Supply Chain Security Roundup appeared first on Security Intelligence.

Continue reading 2021 Manufacturing and Supply Chain Security Roundup

IoT Security: Why Food Industry Cyber Awareness Should Be Your Main Ingredient

The food industry faces an uncertain future. Restaurants and prepared-food companies, food manufacturers, farmers and producers that survived the lockdowns of 2020 and 2021 are heading into a new world. Some of the competition has been removed, new players are entering the market and both tastes and consumer habits have changed. Take a look at […]

The post IoT Security: Why Food Industry Cyber Awareness Should Be Your Main Ingredient appeared first on Security Intelligence.

Continue reading IoT Security: Why Food Industry Cyber Awareness Should Be Your Main Ingredient

Expert Interview: How to Secure Critical Infrastructure With Operational Technology

In April 2021, the U.S. government announced a new effort to protect industrial control systems (ICS) from cyberattacks. For the cybersecurity community, the announcement may come as no surprise. Vulnerabilities in critical infrastructure such as ICS and the operational technologies (OT) that run them have made frequent headlines. From public water system threats to research […]

The post Expert Interview: How to Secure Critical Infrastructure With Operational Technology appeared first on Security Intelligence.

Continue reading Expert Interview: How to Secure Critical Infrastructure With Operational Technology

Expert Interview: How to Secure Critical Infrastructure With Operational Technology

In April 2021, the U.S. government announced a new effort to protect industrial control systems (ICS) from cyberattacks. For the cybersecurity community, the announcement may come as no surprise. Vulnerabilities in critical infrastructure such as ICS and the operational technologies (OT) that run them have made frequent headlines. From public water system threats to research […]

The post Expert Interview: How to Secure Critical Infrastructure With Operational Technology appeared first on Security Intelligence.

Continue reading Expert Interview: How to Secure Critical Infrastructure With Operational Technology