On the Importance of Protecting U.S. Pipeline Owners and Operators

In the beginning of May, a U.S. pipeline company suffered a ransomware attack. The company decided to respond by halting operations while it investigated the incident. This delayed tens of millions of gallons of fuel from reaching their destination all… Continue reading On the Importance of Protecting U.S. Pipeline Owners and Operators

Critical Business Operations Are At Risk, and Companies Are Not Making This a Priority

Many companies around the world with industrial operations environments, commonly referred to as operational technology (OT) environments, do not invest the same resources to protect OT systems as they do to secure their corporate enterprise environments. Yet, these same companies are investing significantly to transform these environments with modern technologies and techniques to improve productivity, […]

The post Critical Business Operations Are At Risk, and Companies Are Not Making This a Priority appeared first on Security Intelligence.

Continue reading Critical Business Operations Are At Risk, and Companies Are Not Making This a Priority

A Fifth of IT Decision-Makers Not Confident in Their OT System Security, Reveals Survey

Attacks against operational technology (OT) and industrial control systems (ICS) grew dramatically in the past few years. Indeed, a 2020 report found that digital attacks against those two kinds of assets increased by over 2000% between 2018 and 2020. … Continue reading A Fifth of IT Decision-Makers Not Confident in Their OT System Security, Reveals Survey

IT Network Attacks Can Impact Your OT Networks, Too

On May 8th, I was at a gas station filling up my car before a trip I was taking when the news about a cyberattack against a large pipeline company broke. The attack led them to halt all operations. Ultimately, the incident stemmed from a ransomware inf… Continue reading IT Network Attacks Can Impact Your OT Networks, Too

Ghosts in the Machine – OT and IT Convergence

There is a saying in cybersecurity that “Data is the new oil.” If that is true, then that oil is powering not only the economy but also industry. The term ‘Industry 4.0’ refers to the fourth industrial revolution where traditional manufacturing and ind… Continue reading Ghosts in the Machine – OT and IT Convergence

NSA offers advice: connecting OT to the rest of the net can lead to “indefensible levels of risk”

The US Defense Department and third-party military contractors are being advised to strengthen the security of their operational technology (OT) in the wake of security breaches, such as the SolarWinds supply chain attack. The guidance comes from the N… Continue reading NSA offers advice: connecting OT to the rest of the net can lead to “indefensible levels of risk”

Industrial Security: Not Just IT and OT, but Old OT and New OT

Lane Thames, PhD and principal security researcher at Tripwire explains the challenges you might not have considered in IT/OT convergence. Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com/podcast/the-tripw… Continue reading Industrial Security: Not Just IT and OT, but Old OT and New OT

A Full Rainbow of Protection: Tripwire Is More than ‘Just FIM’

Imagine an arc. Not just any arc. A rainbow. When we think of a rainbow, it conjures impressions of color, inspiration and even supernatural characteristics.  Does your cybersecurity program long for a magical pot of gold at the end of a rainbow? With … Continue reading A Full Rainbow of Protection: Tripwire Is More than ‘Just FIM’

Just What The Cyber Doctors Ordered – OT For Pharmaceutical Companies

Several digital attacks against pharmaceutical companies have made news in the past few years. Back in 2017, for instance, Merck fell victim to NotPetya. The wiper malware spread to the pharmaceutical giant’s headquarters, rendered years of research in… Continue reading Just What The Cyber Doctors Ordered – OT For Pharmaceutical Companies

To Patch or Not to Patch in OT – That Is the Real Challenge

The objective of an organization when implementing cybersecurity controls is to eliminate risk, but this oftentimes involves settling for managing risk at an acceptable level. Each organization defines what that acceptable level is depending on several… Continue reading To Patch or Not to Patch in OT – That Is the Real Challenge