Electric grids are key critical infrastructure components. To protect them against continually evolving threats, generators, transmitters, and distributors...
CISA's OT security alert (AA22-103A) about malware that hackers use to target ICS - SCADA devices highlights the value of a risk-based OT/IT/IIoT security approach for critical infrastructure and industrial facilities.
Over just ten recent days, we’ve witnessed no less than three significant OT security events that impact critical infrastructure. Collectively, they are a ‘perfect cyber storm’ highlighting known and unknown supply-chain vulnerabilities.
In this post, we’ll take a closer look at NERC CIP, discuss why the framework is especially relevant in today’s turbulent cyber climate and see how companies can simplify their compliance with it.
In a world where threats constantly arise and exposures are identified, organizations must have a clear view of their operational security posture and a feasible action plan to continuously improve it.
Earlier this week, GE Digital published 2 advisories of vulnerabilities in GE’s SCADA/HMI product - Proficy CIMPLICITY that were discovered by OTORIO’s research team.
Compliance requirements have done a lot to increase awareness and drive investment, but the question remains – Does compliance guarantee that effective security is in place?
Today, cyberattacks against critical infrastructure are being used strategically to foment and influence the course of political conflicts. Cyber defense of critical infrastructure has become a key component of national security for all nations.