Latest OTORIO research to be presented at S4x23 points to wireless IIoT vulnerabilities that provide a direct path to internal OT networks, enabling hackers to bypass common protection layers in operational and industrial networks.
Food producers and beverage makers have become some of the preferred targets of ransomware attackers. As a critical infrastructure industry, how can food and beverage manufacturers manage risk effectively for their OT security and converged networks?
CISA's OT security alert (AA22-103A) about malware that hackers use to target ICS - SCADA devices highlights the value of a risk-based OT/IT/IIoT security approach for critical infrastructure and industrial facilities.
Over just ten recent days, we’ve witnessed no less than three significant OT security events that impact critical infrastructure. Collectively, they are a ‘perfect cyber storm’ highlighting known and unknown supply-chain vulnerabilities.
In a world where threats constantly arise and exposures are identified, organizations must have a clear view of their operational security posture and a feasible action plan to continuously improve it.
Today, cyberattacks against critical infrastructure are being used strategically to foment and influence the course of political conflicts. Cyber defense of critical infrastructure has become a key component of national security for all nations.
Many CISOs from leading industrial organizations feel like they are not receiving the best value from their existing cybersecurity solutions. Why do existing OT security paradigms fail to deliver on their promise? Here are the top five reasons...
OT, IT, and IoT are rapidly converging. All three domains are under increasing threats that steal vital information, halt production, and even put human lives at risk. The era of treating their cybersecurity needs separately is coming to a close.
While Saudi Aramco is deep in the throes of a dangerous data leak and ransom demand, cybersecurity pros manning the gates at other critical industrial facilities had better consider the ramifications for their own company’s well-being and right away.
The letter sent out on June 3rd by the US National Security Council's top cyber official, less than a week after the DHS/TSA directive, leaves no doubt: No company is safe from being targeted by ransomware.
The recent flood of serious ransomware attacks on critical infrastructure targets – with the latest being the attack on Colonial Pipeline - has led the US government to turn up the heat on critical infrastructure cybersecurity measures.
Attacks across all sectors are growing bolder, more frequent, and exponentially more expensive. A recent report found that ransomware attacks targeting the industry were second only to those targeting government in prevalence.