Trisis has the security world spooked, stumped and searching for answers

At first, technicians at multinational energy giant Schneider Electric thought they were looking at the everyday software used to manage equipment inside nuclear and petroleum plants around the world. They had no idea that the code carried the most dangerous industrial malware on the planet. More than four months have passed since a novel, highly sophisticated piece of malware forced an important oil and gas facility in the Middle East to suddenly shut down, but cybersecurity analysts still don’t know who wrote the code. Since last August, multiple teams of researchers in the public and private sectors have been examining what the perpetrators planted inside a nondescript Saudi computer network. It’s a rare case involving a computer virus specially engineered to sabotage industrial control systems (ICS) — the gear that keeps factories and refineries running. Manipulating these systems can have a destructive impact far beyond the network. Today, the incident’s magnitude and implications are […]

The post Trisis has the security world spooked, stumped and searching for answers appeared first on Cyberscoop.

Continue reading Trisis has the security world spooked, stumped and searching for answers

Nozomi Networks raises $15 million for expansion of its industrial cybersecurity offerings

Industrial cybersecurity firm Nozomi Networks announced a $15 million Series B funding round Wednesday, positioning itself to be a bigger player in the growing field of companies focused on protecting industrial control systems (ICS). The Invenergy Future Fund led the round, with participation from THI Investments and all existing investors: GGV Capital, Lux Capital and Planven Investments SA. The latest round brings Nozomi Networks’ total funding to date to $23.8 million. Since being founded in 2013, the company has built products focused on machine learning and artificial intelligence that secure companies operating and maintaining critical infrastructure. The San Francisco-based company’s two products, SCADAGuardian and Central Management Console, provide users with a wide array of security options that can be deployed across multiple levels of ICS infrastructure, including supervisory control and data acquisition (SCADA) systems. Nozomi claims it has more than 200 customers across five continents, including companies that deal with energy, […]

The post Nozomi Networks raises $15 million for expansion of its industrial cybersecurity offerings appeared first on Cyberscoop.

Continue reading Nozomi Networks raises $15 million for expansion of its industrial cybersecurity offerings

Siemens Update Patches SIMATIC PCS 7 Bug in Some Versions

Siemens has fixed a remotely executable vulnerability in some versions of its SIMATIC PCS 7 distributed control system, and said that it is working on a fix for remaining affected versions. Continue reading Siemens Update Patches SIMATIC PCS 7 Bug in Some Versions

Tripwire University: ICS/SCADA Edition

What do Robert M. Lee, Eric Byres, Sean McBride, Dr. Oliver Kleineberg, and Sid Snitkin all have in common? If any of these names do not ring a bell, they’re each industrial cybersecurity experts in different realms. Along with Tripwire customers and other industry leaders, they will be sharing fast-paced perspectives and challenging you to […]… Read More

The post Tripwire University: ICS/SCADA Edition appeared first on The State of Security.

The post Tripwire University: ICS/SCADA Edition appeared first on Security Boulevard.

Continue reading Tripwire University: ICS/SCADA Edition

Industrial Cybersecurity: Addressing Today’s and Tomorrow’s Challenges

Industrial control system (ICS) cybersecurity has come a long way over the last decade. Today, we have well-established guidance for securing industrial plants and SCADA systems, including IEC-62443, NERC CIP, and the NIST Cybersecurity Framework. Industry and governmental efforts to build awareness of cyber risks have also been successful. Most industrial companies today appreciate the […]… Read More

The post Industrial Cybersecurity: Addressing Today’s and Tomorrow’s Challenges appeared first on The State of Security.

The post Industrial Cybersecurity: Addressing Today’s and Tomorrow’s Challenges appeared first on Security Boulevard.

Continue reading Industrial Cybersecurity: Addressing Today’s and Tomorrow’s Challenges

What Do Recent Attacks Mean for OT Network Security?

Cyberattacks such as WannaCry, NotPetya and Industroyer wreaked havoc on organizations, but they provided lessons for security your OT network.

The post What Do Recent Attacks Mean for OT Network Security? appeared first on Security Intelligence.

Continue reading What Do Recent Attacks Mean for OT Network Security?

Spotlight on Energy and Utilities Sector: Attacks Targeting ICS Systems Projected to Increase

According to IBM X-Force data, cybercriminals have been targeting industrial control systems in the energy and utilities sector at an increasing rate.

The post Spotlight on Energy and Utilities Sector: Attacks Targeting ICS Systems Projected to Increase appeared first on Security Intelligence.

Continue reading Spotlight on Energy and Utilities Sector: Attacks Targeting ICS Systems Projected to Increase

Survey Findings: Plant Managers May Have a False Sense of Industrial Cyber Security

A common best practice in any field is to benchmark performance or results against industry norms. Based on comparison results, adjustments or business decisions can be made. In the case of industrial control systems (ICS), security benchmarking is a challenge because there isn’t a lot of data available and it’s not as extensive or granular […]… Read More

The post Survey Findings: Plant Managers May Have a False Sense of Industrial Cyber Security appeared first on The State of Security.

Continue reading Survey Findings: Plant Managers May Have a False Sense of Industrial Cyber Security