Security News

Geopolitical tensions escalate OT cyber attacks
2024-04-15 04:30

How has the global geopolitical environment influenced the landscape of OT cyber attacks? The 2024 Threat Report highlights a 19% increase in OT cyber attacks in 2023 compared to the previous year.

Cybercrims: When we hit IT, they sometimes pay, but when we hit OT... jackpot
2024-02-27 09:30

Analysis Cybercriminals follow the money, and increasingly last year that led them to ransomware attacks against the manufacturing industry. Operational technology security firm Dragos, in its 2023 year-in-review report [PDF], found 70 percent of all industrial org ransomware infections hit manufacturing companies.

#OT
Unmanaged third-party access threatens OT environments
2024-02-27 04:00

Ensuring secure access to OT environments is about more than just cybersecurity. At the same time, more third-party vendors and contractors are being given remote access to OT environments.

#OT
Review: Engineering-grade OT security: A manager’s guide
2024-01-08 06:00

Rew Ginter is a widely-read author on industrial security and a trusted advisor for industrial enterprises. He currently works as a VP of industrial security at Waterfall Security Solutions.

Industry regulations and standards are driving OT security priorities
2023-12-13 04:00

In Claroty's previous survey conducted in 2021, 32% of ransomware attacks impacted IT only, while 27% impacted both IT and OT. Today, 21% impact IT only, while 37% impact both IT and OT - a significant 10% jump for the latter in just two years. 61% of respondents are currently utilizing security tools that leverage generative AI and an alarming 47% say that it raises their security concerns.

21 high-risk vulnerabilities in OT/IoT routers found
2023-12-06 09:40

Forescout detailed the discovery of 21 new vulnerabilities in OT/IoT routers and open-source software elements. The "SIERRA:21 - Living on the Edge" report features research into Sierra Wireless AirLink cellular routers and some open-source components, such as TinyXML and OpenNDS. Sierra Wireless routers are popular - an open database of Wi-Fi networks shows 245,000 networks worldwide running Sierra Wireless for various applications.

Meeting the challenge of OT security
2023-11-01 08:38

Increased systems connectivity inevitably brings its own risks, often including cyber security blind spots that expose sensitive data to unauthorised access and disruption. Staying secure and compliant demands detailed visibility of OT assets and the ability to protect them over an extended network.

OT cyber attacks proliferating despite growing cybersecurity spend
2023-10-26 04:30

The sharp increase in attacks on operational technology systems can be primarily attributed to two key factors: the escalating global threats posed by nation-state actors and the active involvement of profit-driven cybercriminals. The lack of success on the defense side can be attributed to several factors: the complexity of OT environments, the convergence of information technology and OT, insider attacks, supply chain vulnerabilities, and others.

What is operational risk and why should you care? Assessing SEC rule readiness for OT and IoT
2023-10-25 04:30

Of particular concern is whether public companies who own and operate industrial control systems and connected IoT infrastructure are prepared to fully define operational risk, and therefore are equipped to fully disclose material business risk from cyber incidents. Operational risk in OT and IoT. Cybersecurity incidents continue to disrupt production, with companies like Clorox reporting product shortages a month after disclosure.

Navigating OT/IT convergence and securing ICS environments
2023-10-23 04:30

Escalating threats to operational technology have prompted an increasing number of global enterprises to adopt sophisticated technologies and services to enhance the security of their assets. In this Help Net Security video, Christopher Warner, Senior GRC-OT Security Consultant at GuidePoint Security, discusses securing the control systems environment, as well as creating a cybersecurity roadmap.