Former Rockwell Automation CISO Dawn Cappelli discusses the mission of the new Dragos OT-CERT - a cybersecurity resource designed to help industrial asset owners and operators build their OT cybersecurity programs, improve their security postures and reduce OT risk - and her role as its director.
In the ever-shifting cybersecurity threat landscape, IT risks have never been more prominent. But what about operational technology? Lesley Carhart of Dragos discusses OT vulnerabilities, how adversaries are taking advantage and why Dragos has launched a new OT CERT.
Forescout has agreed to purchase startup Cysiv to help OT and IoT customers analyze, detect and respond to threats using cloud-native data analytics. The proposed acquisition will make it easier for customers to mine and cross-reference data that's stored on Forescout's platform.
In the latest weekly update, four ISMG editors discuss important cybersecurity issues, including the trending topics at this year's RSA Conference, how security researchers are tracking a zero-day vulnerability in Microsoft Office and what Broadcom's acquisition of VMware means for security.
As the threat landscape continues to evolve with a perpetual influx of new network anomalies and Indicators of Compromise (IOC), prudent defenders must focus on more actionable elements of attack characteristics, such as Tactics, Techniques and Procedures (TTPs). One such example of this is the Initial Access...
Manufacturing is a huge industry with massive amounts of critical data and IoT surfaces, and it is also a lucrative target for cybercriminals. CyberEdBoard member Shankar Karthikason discusses how to secure your OT environment and build an effective cybersecurity program.
Executives and leaders who build technology products or manage infrastructure and operations across manufacturing and other asset-heavy industries realize they can no longer operate in silos. They understand that the fast pace of technology means there are new and innovative solutions they can use to get a detailed...
The separation and security measures relied upon traditionally in IT and OT environments have been compromised by recent interconnectivity. When considering growing proliferation of IT and OT devices, identities and applications along with the rise of hybrid workforce and the skills and resource shortages, the...
John Kindervag, creator of Zero Trust, and two ISMG editors discuss whether we have advanced or regressed in security technology, implementing Zero Trust security in OT environments, and how federal agencies are progressing with Zero Trust adoption a year after the cybersecurity executive order.
Cyber attackers have skills well beyond traditional information technology (IT) intrusions
and data exfiltration techniques—and they have set their sights on operating technology
(OT) environments. They have demonstrated an understanding of industrial control
systems (ICSs) and have an impressive ability to...
A global, integrated oil and gas company operating across five continents is using digital
transformation to grow its business, enter new markets and be more competitive. Critical
to this effort is a cloud-based digitalization initiative to enable advanced analytics and
decision-making, fueling greater efficiency,...
ICS and their end-use critical infrastructure organizations can now establish a live view into their organization’s overall security posture inclusive of their external perimeter, while placing focus on ‘crown jewel’ operational technology (OT) assets.
The cybersecurity industry has found that timely and secure...
Adversaries are increasingly targeting ONG and related energy industries to further political, economic, and national security goals. Their activity threatens the availability of industrial technologies and the safety of those operating them. Industrial asset owners and operators can defend against these...
Fortinet's operational technology business will surpass its SD-WAN practice due to the elevated threat environment and increased interest from manufacturing customers, CEO Ken Xie says. Fortinet's OT bookings grew 76% in the quarter ended March 30, outpacing SD-WAN bookings growth of 54%.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.