Two Steps to Adopting Cyber Security Best Practices for Manufacturing

The manufacturing environment is changing fast. Digital transformation promises substantial increases in productivity, speed and quality. Securing modern manufacturing is essential to safety and uptime.
Fortunately, guidelines such as the NIST Cyberse… Continue reading Two Steps to Adopting Cyber Security Best Practices for Manufacturing

Using Secure-by-Design Power Systems To Prevent Cyberattacks

Malicious hackers are threatening public safety all over the world. Cyberattacks could cut off the supply of electricity to hospitals, homes, schools and factories. A loss of electricity would also have heavy implications for other vital services.
To … Continue reading Using Secure-by-Design Power Systems To Prevent Cyberattacks

5 Things to Consider for Your ICS Security Proof of Concept

The post 5 Things to Consider for Your ICS Security Proof of Concept appeared first on Nozomi Networks.
The post 5 Things to Consider for Your ICS Security Proof of Concept appeared first on Security Boulevard.
Continue reading 5 Things to Consider for Your ICS Security Proof of Concept

Oil & Gas Cybersecurity and Process Safety Converge Thanks to TRITON

Thanks to TRITON, the Oil and Gas industry became ground zero for the convergence of SIS process safety and ICS cybersecurity.
Read on to learn why a unified approach to monitoring control system and process safety assets is now mission critical, and w… Continue reading Oil & Gas Cybersecurity and Process Safety Converge Thanks to TRITON

Grading My 2018 ICS Security Predictions: Did They Come True?

Going into 2018, I predicted that it would be the year ICS security went mainstream. Industrial cyber security practices would mature, IT and OT would finally converge, and AI technologies would facilitate threat monitoring.
As we kick off 2019, I refl… Continue reading Grading My 2018 ICS Security Predictions: Did They Come True?

Insecure SCADA Systems Blamed in Rash of Pipeline Data Network Attacks

After a cyberattack shut down numerous pipeline communication networks this week experts are stressing the importance of securing third-party systems in supervisory control and data acquisition (SCADA) environments. Continue reading Insecure SCADA Systems Blamed in Rash of Pipeline Data Network Attacks