HackDig : Dig high-quality web security articles

Report: USB threats to ICS systems have nearly doubled

The latest Honeywell USB Threat Report 2020 indicates that the number of threats specifically targeting Operational Technology systems has nearly doubled from 16% to 28%, while the number of threats capable of disrupting those systems rose from 26% to 59% over the same period.Let’s face it. Critical infrastructure operators in manufacturing, aerospace, energ
Publish At:2021-04-01 06:25 | Read:170 | Comments:0 | Tags:ICS Security Cyberattacks Honeywell operational technology U

To Patch or Not to Patch in OT – That Is the Real Challenge

The objective of an organization when implementing cybersecurity controls is to eliminate risk, but this oftentimes involves settling for managing risk at an acceptable level. Each organization defines what that acceptable level is depending on several factors including the environment, the criticality of function, the asset type, etc.There are many methods
Publish At:2021-03-17 02:08 | Read:303 | Comments:0 | Tags:ICS Security Industrial Control Systems operational technolo

Acceso Remoto Seguro: Por que es importante y por que hay que hacerlo bien

Con la llegada de COVID-19  las organizaciones de todo el mundo fueron obligadas a hacer la transición de sus empleados a trabajar desde casa, en un momento en que la infraestructura de red de las organizaciones es más compleja que nunca. Esta complejidad no es única de los entornos de IT. De hecho, las máquinas y los procesos de producción también se e
Publish At:2020-12-30 09:20 | Read:481 | Comments:0 | Tags:Featured Articles Spanish operational technology remote acce

5 Key Security Challenges Facing Critical National Infrastructure (CNI)

Digital threats confronting Critical National Infrastructure (CNI) are on the rise. That’s because attackers are increasingly going after the Operational Technology (OT) and Industrial Control Systems (ICS) that shareholders use to protect these assets. In their report “Caught in the Crosshairs: Are Utilities Keeping Up with the Industrial Cyber Threat?,” fo
Publish At:2020-12-17 01:32 | Read:622 | Comments:0 | Tags:ICS Security Critical Infrastructure ICS security Industrial

Key OT Cybersecurity Challenges: Availability, Integrity and Confidentiality

Organisations are still underestimating the risks created by insufficiently secured operational technology (OT).One current example comes from Germany. According to a report by heise.de, external security testers consider it “likely” that a successful serious cyberattack against the publicly owned water company Berliner Wasserbetriebe could lead to a complet
Publish At:2020-12-07 03:38 | Read:587 | Comments:0 | Tags:ICS Security IT Security and Data Protection Availability Co

CEOs Will Be Personally Liable for Cyber-Physical Security Incidents by 2024

Digital attack attempts in industrial environments are on the rise. In February 2020, IBM X-Force reported that it had observed a 2,000% increase in the attempts by threat actors to target Industrial Control Systems (ICS) and Operational Technology (OT) assets between 2018 and 2010. This surge eclipsed the total number of attacks against organizations’ indus
Publish At:2020-11-18 03:20 | Read:488 | Comments:0 | Tags:Risk-Based Security for Executives C-Suite CEO liability ope

How Containers Support the IT-OT Convergence

The worlds of information technology (IT) and operational technology (OT) are colliding. In July 2019, Automation.com cited a survey finding where 82% of respondents told Forrester and Nozomi Networks that their organizations were in the early stages of an IT-OT convergence. Some said their organizations were embracing this meeting more fully.This finding be
Publish At:2020-10-28 00:19 | Read:678 | Comments:0 | Tags:Internet of Things containers IIoT information technology IT

3 Zones that Require Network Security for Industrial Remote Access

By now, we have a good understanding of what secure remote access (SRA) is and why organizations might choose to enable it for their OT environments. We also know that securing IT-OT collaboration, leveraging guidance from best practice frameworks and using an automated solution can help organizations to implement this type of access. Even so, we still don’t
Publish At:2020-10-19 01:49 | Read:697 | Comments:0 | Tags:ICS Security Industrial operational technology remote access

Being Cyber Resilient Is Critical for the Maritime Industry

Cyber-attacks against maritime and shipping organizations are only increasing. Notwithstanding the IMO’s requirement for organizations in this sector to achieve cyber resilience by 2021, more and more entities are being crippled by malicious attacks.Maritime cyber-attacks are increasingThe last victim in a long list of cyber-attacks was cruise operator Carni
Publish At:2020-09-30 12:20 | Read:509 | Comments:0 | Tags:Cyber Security Featured Articles cyber attack cyber resilien

Joint “CYPRES” Report on Incident Response Released by FERC

Earlier this month, the Federal Energy Regulatory Commission (FERC) published a joint report entitled “Cyber Planning Response and Recovery Study” (CYPRES) in partnership with the North American Electric Reliability Corporation (NERC) and eight of its Regional Entities (REs) in order to review the methods for responding to a cybersecurity event. The report i
Publish At:2020-09-30 12:20 | Read:607 | Comments:0 | Tags:Featured Articles ICS Security FERC Incident Response and Ma

How IT-OT Security Has Changed in the Wake of COVID-19

After the global outbreak of coronavirus 2019 (COVID-19), organizations quickly transitioned to remote work in order to enforce social distancing and to keep their employees safe. But this work-from-home arrangement opened up organizations to more risk as well as less redundancy and resilience. That’s especially the case for organizations with operational te
Publish At:2020-08-24 02:27 | Read:1824 | Comments:0 | Tags:Featured Articles IT Security and Data Protection digital tr

Secure Remote Access: Why It’s Important and How to Do It Right

COVID-19 forced organizations all over the world to transition their employees to a work-from-home policy. That change came at a time when organizations’ connected infrastructure is more complex than ever. Such complexity doesn’t just extend across IT environments, either. Indeed, machines and production processes are also becoming increasingly complex as or
Publish At:2020-08-05 00:35 | Read:971 | Comments:0 | Tags:Featured Articles IT Security and Data Protection operationa

The Biggest Challenges and Best Practices to Mitigate Risks in Maritime Cybersecurity

Ships are increasingly using systems that rely on digitalization, integration, and automation, which call for cyber risk management on board. As technology continues to develop, the convergence of information technology (IT) and operational technology (OT) onboard ships and their connection to the Internet creates an increased attack surface that needs to be
Publish At:2020-08-03 00:25 | Read:1045 | Comments:0 | Tags:IT Security and Data Protection Cyber Threats maritime secur

Using “Update.exe” as a Case Study for Robust OT Cybersecurity

In 2020, car manufacturer Honda fell victim to a ransomware attack. Using a payload called “update.exe,” the attack crippled Honda’s international customer service and Financial Services wing for days. Although it affected two customer facing branches of this global corporation, the ransomware was designed to target and breach Honda’s critical ICS/SCADA envi
Publish At:2020-07-07 00:04 | Read:823 | Comments:0 | Tags:Featured Articles ICS Security cyberattack ICS security malw

Podcast Episode 8: Industrial Cybersecurity – From HVAC Systems to Conveyor Belts

Tripwire’s General Manager of Industrial Cybersecurity, Kristen Poulos, discusses the risks that come with the increasing number of connected devices operating on the plant floor and throughout facilities. In this episode, Kristen shares how IT can partner with OT to protect the safety, productivity, and quality of operations.Spotify: https://open.spot
Publish At:2020-06-16 16:30 | Read:824 | Comments:0 | Tags:ICS Security Podcast Industrial Control Systems information