As OT systems become more interconnected, traditional air gaps disappear, creating new risks, said Joseph Carson, chief security scientist and advisory CISO at Delinea. The convergence of IT and OT environments requires a stronger focus on protecting digital identities and access controls.
Organizations mistakenly believe their operational technology systems are air-gapped and immune to cyberthreats. Dawn Cappelli, director of OT-CERT at Dragos, discusses why these assumptions are dangerous security gaps and why organizations need to rethink their approach to OT security.
Dennis Giese, a security researcher and engineer, built his first computer at around age 8 using spare parts. Years later, he hacked his first robotic vacuum cleaner. Giese reflects on his journey as a researcher and ethical hacker during HardPwn, a hardware hackathon hosted by Hardwear.io in Amsterdam.
A "road map to resilience" approach helps organizations balance immediate, low-cost security improvements with complex, long-term risk reduction initiatives in industrial control systems, said Mex Martinot, vice president and global head of industrial cybersecurity at Siemens Energy.
ISMG's Cybersecurity Pulse Report: ManuSec USA 2024 Edition is an essential resource for senior cybersecurity leaders and marketers navigating the complex landscape of operational technology security in manufacturing. This exclusive report distills critical insights from 61 industry pioneers.
Armis has closed a $200 million Series D funding round on a $4.2 billion valuation to drive growth in cyber exposure management with a focus on acquisitions and federal expansion. CEO Yevgeny Dibrov says the funds will accelerate Armis' work in operational technology and medical device security.
Researchers demonstrated that multiple brands of EV charging stations have vulnerabilities due to manufacturers often leaving open and unsecured SSH and HTTP ports. The risks of these vulnerabilities range from an expanded attack surface to a launching pad for assaults on the power grid.
While ransomware attacks against medical devices don't happen often, disruptive cyber incidents that affect the availability of the IT systems that medical devices rely on are a big concern that needs the industry's critical attention, said Jessica Wilkerson of the FDA.
Medical device makers have become more proactive in trying to meet higher cybersecurity expectations of regulators, but many still need to better understand the importance of life cycle security risk management and related issues, said Axel Wirth of Medcrypt and Christopher Gates of Velentium.
High Alert. An apt description of the current state of Operational Technology, especially in the energy industry. There has been an alarming growth in both the size of the attack surface and the range of potential OT targets within critical infrastructure. The potential damage to brand reputation, the financial...
Networking and security are converging at lightning speeds. To manage the sprawl of solutions – and any gaps between them – and consistently protect your converged IT/OT landscape, you need a digital business infrastructure that’s secure by design.
Download this whitepaper to see how the combined threat...
It is the most important EU cybersecurity directive of this decade. By October 17, 2024, the EU’s 27 member states must enact national laws that implement enforcement mechanisms and infrastructure to elevate cybersecurity defenses, cross-border coordination, and cyber resilience across the EU. The timing of...
The manufacturing sector was not explicitly regulated under NIS1 but under NIS2, the manufacturing sector is specifically included, particularly focusing on certain subsectors that are critical for the EU’s economy and security.
Check out this whitepaper to make sure you are ready for this directive. Gain tips...
As manufacturers work to digitize their operations, this shift exposed their organizations to more cybersecurity risks, particularly with the increases in smart devices on factory floors.
Check out this infographic to discover strategies for:
Coping with the New Threat Landscape;
The State of IT and OT...
In this report, Enterprise Strategy Group (ESG) completed a quantitative economic analysis of Palo Alto Networks Industrial OT Security with a focus on how organizations have been able to use the service to detect, categorize and protect assets in their manufacturing and industrial OT security environments.
Read the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.