As the threat landscape continues to evolve with a perpetual influx of new network anomalies and Indicators of Compromise (IOC), prudent defenders must focus on more actionable elements of attack characteristics, such as Tactics, Techniques and Procedures (TTPs). One such example of this is the Initial Access...
Insider threat is a well-known phenomenon that is considered by most to be the greatest threat to any information security environment. Access control measures attempt to mitigate much of this through physical (hardware) and software-based means.
In the case of environments where industrial control systems (ICS)...
Manufacturing is a huge industry with massive amounts of critical data and IoT surfaces, and it is also a lucrative target for cybercriminals. CyberEdBoard member Shankar Karthikason discusses how to secure your OT environment and build an effective cybersecurity program.
As operational technology (OT) cybersecurity becomes a top priority from boardrooms to the manufacturing floor, CISOs and their teams must implement proven strategies to protect the business.
OT, however, has long been underrepresented, leading to communication challenges, a cultural gap with IT, and uncertainty...
Executives and leaders who build technology products or manage infrastructure and operations across manufacturing and other asset-heavy industries realize they can no longer operate in silos. They understand that the fast pace of technology means there are new and innovative solutions they can use to get a detailed...
The separation and security measures relied upon traditionally in IT and OT environments have been compromised by recent interconnectivity. When considering growing proliferation of IT and OT devices, identities and applications along with the rise of hybrid workforce and the skills and resource shortages, the...
There has been plenty of discussion about rolling out zero trust architecture to protect information technology. But what about operational technology? Samuel Hill of Claroty addresses the unique needs - and challenges - of applying zero trust in the OT environment.
In this interview with Information Security Media...
John Kindervag, creator of Zero Trust, and two ISMG editors discuss whether we have advanced or regressed in security technology, implementing Zero Trust security in OT environments, and how federal agencies are progressing with Zero Trust adoption a year after the cybersecurity executive order.
Cyber attackers have skills well beyond traditional information technology (IT) intrusions
and data exfiltration techniques—and they have set their sights on operating technology
(OT) environments. They have demonstrated an understanding of industrial control
systems (ICSs) and have an impressive ability to...
A global, integrated oil and gas company operating across five continents is using digital
transformation to grow its business, enter new markets and be more competitive. Critical
to this effort is a cloud-based digitalization initiative to enable advanced analytics and
decision-making, fueling greater efficiency,...
ICS and their end-use critical infrastructure organizations can now establish a live view into their organization’s overall security posture inclusive of their external perimeter, while placing focus on ‘crown jewel’ operational technology (OT) assets.
The cybersecurity industry has found that timely and secure...
Adversaries are increasingly targeting ONG and related energy industries to further political, economic, and national security goals. Their activity threatens the availability of industrial technologies and the safety of those operating them. Industrial asset owners and operators can defend against these...
Fortinet's operational technology business will surpass its SD-WAN practice due to the elevated threat environment and increased interest from manufacturing customers, CEO Ken Xie says. Fortinet's OT bookings grew 76% in the quarter ended March 30, outpacing SD-WAN bookings growth of 54%.
Across industrial sectors, limited asset visibility, reliance on manual processes and siloed data are three common factors that make it hard to effectively protect OT operations and streamline IT and OT vulnerability management & response.
In this live webinar, you'll get guidance from subject matter experts on...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.