The digitalization of industrial infrastructure is underway, and 55% of organizations are confident that the Internet of Things, as one of its key aspects, will change the state of security in industrial control systems (ICS). According to Kaspersky’s recent report, 20% of organizations have already prioritized IoT-related incidents, but effective solutions against IoT threats are not yet widespread.
The Common Vulnerabilities and Exposures (CVE®) Program announced it is granting authority to the Cybersecurity and Infrastructure Security Agency (CISA) for managing the assignment of CVE Identifiers (IDs) for the CVE Program.
The nature of IIoT devices and infrastructure makes them high-value cyber targets. This is because they are relatively easy to compromise and are often connected to internal networks with high-value content with links to other networks. Moreover, IIoT devices rarely have direct user interaction, and this unattended nature means that many types of device compromise are likely to go unnoticed and undetected – particularly when the malware does not disrupt the device’s primary functionality. Here are a dozen reasons why intelligent IIoT devices are attractive targets for hackers.
Why is cybersecurity so often overlooked by Operational Technology engineers? The answer can be traced to four common myths. Here, we explore why these four misconceptions are no longer true in today’s highly interconnected world and discuss the differences between IT and OT networks, and share some best practice guidelines to help your organization successfully overcome these IT-OT differences and transition to IIoT or Industry 4.0 systems.
Cybersecurity education and research in the Pacific Northwest is receiving a $2.5 million infusion due to a partnership between global power systems protection leader Schweitzer Engineering Laboratories (SEL) and the University of Idaho College of Engineering.
Employee errors or unintentional actions were behind 52 percent of incidents affecting operational technology and industrial control system (OT/ICS) networks last year, according to a new Kaspersky report “State of Industrial Cybersecurity 2019”.
The cyber threats facing Industrial Control Systems (ICS) include nation-state attacks, hacktivists, criminals and even trusted insiders. The frequency and ferocity of attacks are growing and continue to pose a major challenge to those ICS practitioners and cybersecurity teams tasked with protecting our critical national infrastructure (CNI).