How to Dissect Unusual Protocols for Troubleshooting OT Security

To analyze the OT security risks of undocumented protocols, we need to understand how devices work, and how they communicate. Nozomi Networks Labs demonstrates how to use Lua APIs to instruct Wireshark to properly dissect an undocumented protocol.
The … Continue reading How to Dissect Unusual Protocols for Troubleshooting OT Security

Defending Against IoT Security Camera Hacks Like Verkada

Verkada was the target of a successful cyberattack that allowed the perpetrators unfettered access to the live video feeds of 150,000 surveillance cameras. Network monitoring technology could have alerted them to the attack – and helped them contain an… Continue reading Defending Against IoT Security Camera Hacks Like Verkada

Focus of OT and IoT Cybersecurity in Australia’s Critical Infrastructure

The Australian Government’s approach to OT/IoT security is a significant step forward, but great challenges still exist for critical infrastructure.
The post Focus of OT and IoT Cybersecurity in Australia’s Critical Infrastructure appeared first on Noz… Continue reading Focus of OT and IoT Cybersecurity in Australia’s Critical Infrastructure

Why Your OT/IoT Network Needs “Always On” Security and Visibility

Without “always on” security, you could miss significant indicators of malicious activity, and risk an OT security breach or downtime.
The post Why Your OT/IoT Network Needs “Always On” Security and Visibility appeared first on Nozomi Networks.
The pos… Continue reading Why Your OT/IoT Network Needs “Always On” Security and Visibility

Overcoming the Challenges of Detecting P2P Botnets on Your Network

It can be challenging to disrupt the malicious activities of peer-to-peer (P2P) botnets. Find out how to protect your OT/IoT networks against them.
The post Overcoming the Challenges of Detecting P2P Botnets on Your Network appeared first on Nozomi Net… Continue reading Overcoming the Challenges of Detecting P2P Botnets on Your Network

Surge in Cyberattacks Puts Manufacturing OT Systems at Risk

The fourth industrial revolution has failed to address the extraordinary surge in cyberattacks that put manufacturing OT systems and automation at risk.
The post Surge in Cyberattacks Puts Manufacturing OT Systems at Risk appeared first on Nozomi Netwo… Continue reading Surge in Cyberattacks Puts Manufacturing OT Systems at Risk

Taking Action Against Racism

At Nozomi Networks, we strive to do our best every single day. Today, we’re making sure that non-inclusive terminology is no longer part of our vocabulary.
The post Taking Action Against Racism appeared first on Nozomi Networks.
The post Taking A… Continue reading Taking Action Against Racism

What IT Needs to Know about OT/IoT Security Threats in 2020

Find out what IT needs to know about OT/IoT security in 2020, including the most active threats, their techniques and recommendations for mitigations.
The post What IT Needs to Know about OT/IoT Security Threats in 2020 appeared first on Nozomi Networ… Continue reading What IT Needs to Know about OT/IoT Security Threats in 2020

Enhanced Product Security Incident Response Reduces Customer Risk

Nozomi Networks is quickly expanding to serve more and more industrial, critical infrastructure and operational technology sectors in countries around the globe.
The post Enhanced Product Security Incident Response Reduces Customer Risk appeared first… Continue reading Enhanced Product Security Incident Response Reduces Customer Risk

Secure Remote Access: Gain Control Over Home Office Network Activity

Secure remote access (SRA) is being widely used to rescue companies in danger of collapse and help others thrive. Continuous monitoring of remote activity and detection of anomalies related to stolen credentials is critical.
The post Secure Remote Acc… Continue reading Secure Remote Access: Gain Control Over Home Office Network Activity