HackDig : Dig high-quality web security articles

IT/OT Convergence or IT/OT Integration?

IT/OT convergence is an oft-repeated term, and maybe it’s the wrong term.From a technology standpoint, IT/OT convergence has been occurring since at least the 1990s when HMI/Operator Stations began running on Windows and when Ethernet began displacing deterministic custom LAN protocols in the OT realm. This technology convergence has continued with net
Publish At:2021-07-21 06:29 | Read:95 | Comments:0 | Tags:ICS Security information technology IT-OT convergence ITOT o

Cybersecurity Challenges in the Construction Industry

Digital transformation is at the heart of every industry. There are no longer any industries that are immune to the rapid adoption of this movement. When we think of the construction industry, we may think back to an image of ironworkers sitting over a city and enjoying a lunch break on a construction beam. However, rapid digitalization has tr
Publish At:2021-06-28 07:44 | Read:238 | Comments:0 | Tags:ICS Security digital transformation industry operational tec

On the Importance of Protecting U.S. Pipeline Owners and Operators

In the beginning of May, a U.S. pipeline company suffered a ransomware attack. The company decided to respond by halting operations while it investigated the incident. This delayed tens of millions of gallons of fuel from reaching their destination all along the East Coast.Less than a week later, Bloomberg reported that the company had paid millions of dolla
Publish At:2021-06-23 09:06 | Read:233 | Comments:0 | Tags:ICS Security Department of Homeland Security DHS monitoring

The Evolution of Securing Critical Infrastructure

Everything evolves. Simply stated, the gradual development of something from a simple to a more complex form is what evolution is all about. When something ceases to evolve, yet still exists, it becomes classified as a living fossil. One example is the Ginkgo Biloba tree. It took millions of years for this evolution to cease. This all happened
Publish At:2021-06-22 05:48 | Read:254 | Comments:0 | Tags:ICS Security Critical Infrastructure ICS security

Survey: Nearly Half of Manufacturers Suffered a Digital Attack in the Last Year

Confidence isn’t new when it comes to cybersecurity. All the way back in 2015, for example, 86% of security professionals working in the energy sector told Tripwire that they were confident they could detect a breach in a week. Just less than half (49%) said it wouldn’t take them longer than a day to spot an attack.It was the same story a year later when Tri
Publish At:2021-06-21 06:24 | Read:405 | Comments:0 | Tags:ICS Security data breach digital attack incident detection i

What Is a Security Operations Center (SOC)?

Data breaches are costing organizations millions of dollars on average. In its 2020 Cost of a Data Breach Report, IBM found that a data breach cost the average organization $3.86 million. This price tag was even greater for organizations located in the United States and operating in the healthcare industry at $8.64 million and $7.13 million, respectively.Wha
Publish At:2021-06-17 04:53 | Read:267 | Comments:0 | Tags:Incident Detection Command and Control cybersecurity policy

Key Considerations for the Department of Energy on Defending the Bulk Power Grid

On January 20, President Joseph Biden issued Executive Order (E.O.) 13990 to help protect U.S. bulk power organizations. This Order enacted a 90-day suspension of E.O. 13920 which was set by the previous administration. The new executive order empowered the Secretary of Energy (“Secretary”) to publish new criteria around pre-qualifying vendors of electric eq
Publish At:2021-06-10 07:55 | Read:314 | Comments:0 | Tags:Featured Articles ICS Security Bulk Electric System Critical

A Fifth of IT Decision-Makers Not Confident in Their OT System Security, Reveals Survey

Attacks against operational technology (OT) and industrial control systems (ICS) grew dramatically in the past few years. Indeed, a 2020 report found that digital attacks against those two kinds of assets increased by over 2000% between 2018 and 2020. Many of those attacks involved vulnerabilities in Supervisory Control and Data Acquisition (SCADA) systems a
Publish At:2021-05-27 02:47 | Read:538 | Comments:0 | Tags:ICS Security Critical Infrastructure decision making IIoT op

IT Network Attacks Can Impact Your OT Networks, Too

On May 8th, I was at a gas station filling up my car before a trip I was taking when the news about a cyberattack against a large pipeline company broke. The attack led them to halt all operations. Ultimately, the incident stemmed from a ransomware infection in which a well-known threat actor took volumes of corporate data in just two hours and made their de
Publish At:2021-05-19 23:10 | Read:556 | Comments:0 | Tags:ICS Security Industrial Control Systems information technolo

Ghosts in the Machine – OT and IT Convergence

There is a saying in cybersecurity that “Data is the new oil.” If that is true, then that oil is powering not only the economy but also industry. The term ‘Industry 4.0’ refers to the fourth industrial revolution where traditional manufacturing and industrial processes are increasingly using IT and data to the point that we’re now seeing the emergence of ‘sm
Publish At:2021-05-18 00:18 | Read:774 | Comments:0 | Tags:ICS Security IT-OT convergence ITOT operational technology

Industrial Cybersecurity: Guidelines for Protecting Critical Infrastructure

Over the weekend, the Alpharetta, GA based Colonial Pipeline was hit by an extensive ransomware attack that shut down its information technology (IT) and industrial operational technology (OT) systems. Simply put, an all-too-common ransomware event targeting IT systems encouraged a voluntary shutdown on the production side (OT) of the business to prevent fur
Publish At:2021-05-11 05:25 | Read:571 | Comments:0 | Tags:Featured Articles ICS Security cybersecurity Industrial OT s

NSA offers advice: connecting OT to the rest of the net can lead to “indefensible levels of risk”

The US Defense Department and third-party military contractors are being advised to strengthen the security of their operational technology (OT) in the wake of security breaches, such as the SolarWinds supply chain attack.The guidance comes from the NSA, which this week has issued a cybersecurity advisory entitled “Stop Malicious Cyber Activity Against
Publish At:2021-05-06 10:12 | Read:483 | Comments:0 | Tags:Government ICS Security NSA operational technology supply ch

Industrial IoT Needs to Catch Up to Consumer IoT

When it comes to cybersecurity, industrial IT—consisting mainly of operational technology (OT) and industrial control systems (ICS)—has failed to keep up with development in the enterprise IT world. That’s mostly because industries’ adoption of internet technology has been slower when compared with enterprises.It would take some time to close the gap, but co
Publish At:2021-04-06 02:07 | Read:611 | Comments:0 | Tags:ICS Security IIoT IoT

Report: USB threats to ICS systems have nearly doubled

The latest Honeywell USB Threat Report 2020 indicates that the number of threats specifically targeting Operational Technology systems has nearly doubled from 16% to 28%, while the number of threats capable of disrupting those systems rose from 26% to 59% over the same period.Let’s face it. Critical infrastructure operators in manufacturing, aerospace, energ
Publish At:2021-04-01 06:25 | Read:533 | Comments:0 | Tags:ICS Security Cyberattacks Honeywell operational technology U

Survey: 99% of Security Pros Struggling to Secure Their IoT & IIoT Devices

Organizations are increasingly introducing new Internet of Things (IoT) devices into their environments. According to Statista, the aggregate number of IoT devices deployed by organizations globally increased from 7.74 billion in 2019 to around 8.74 billion a year later. The market and consumer data firm reported that the next few years will see growth in al
Publish At:2021-03-30 06:12 | Read:695 | Comments:0 | Tags:ICS Security ICS security IIoT IoT security

Tag Cloud