OT Security
Increased Number of Cyber Exposed OT/ICS Devices
Exposed OT/ICS Devices Recent data from several tracking sources indicates there has been an increase in the number of public IP addresses with accessible devices using standard OT/ICS protocols – BACnet, Modbus, Fox, Ethernet/IP, S7, and more. Data from three different sources – Censys, ShadowServer, and Shodan – give insight into the number of publicly…
Read MoreZero Trust OT Security – Stopping Cyber Attacks on Industrial Control Systems (ICS/OT/SCADA)
Watch this webinar replay of “Zero Trust OT Security – Stopping Cyber Attacks on Industrial Control Systems (ICS /OT/SCADA)” to learn about applying zero trust security at the device level. This webinar addresses the following topics: ICS cybersecurity standards Existing ICS security approaches Zero Trust and device-level implementation Cybersecurity for existing ICS devices Zero Trust…
Read MoreZero Trust – A Virtual Air Gap for OT Security
Air-gapping computer and operational technology (OT) networks is a long-established method of protecting sensitive information and reducing the risk of operational disruption. A growing trend has been to provide connectivity from these networks to the Internet for remote monitoring and control, real-time data, data analysis, predictive maintenance, improving inventory and resource management, achieving faster decision-making,…
Read MoreZero Trust for OT Security – Shields Up vs Damage Report
In the original and newer Star Trek episodes and movies, the captain would order “shields up” or “raise shields” prior to an attack to prevent damage to the USS Enterprise. The shields were some sort of force field of which the physics is never fully described. During or after an attack the captain would request…
Read MoreZero Trust for OT Security – Overcoming Legacy Device Security Gaps and Technical Debt
The proliferation of interconnected Operational Technology (OT) devices in critical infrastructure and industrial sectors has ushered in new opportunities for increased efficiency and automation. However, this digital transformation also brings forth significant cybersecurity challenges. Perimeter security is not a sufficient solution and legacy devices and systems often lack robust security measures, leaving critical infrastructure vulnerable…
Read MoreModbus Security Issues and How to Mitigate Cyber Risks
Modbus is a commonly used protocol for industrial control systems (ICS), SCADA systems, and operational technology (OT), and is used to establish communication between various devices in a network. Because Modbus-based industrial systems were deployed in isolated (air-gapped) environments, Modbus was designed for reliability, availability, and speed – not security. Therefore, the millions of Modbus…
Read MoreProtecting Farms and AgTech from Cyberattacks
Agricultural control systems, used for implementing precision agriculture, and part of the overall AgTech category, are used to manage and optimize farm operations through the use of technology. These systems have become increasingly sophisticated in recent years, utilizing sensors, drones, and other connected devices to collect and analyze data on crops, soil, and weather conditions.…
Read MoreCybersecurity threats to hospitals and healthcare facility building management systems
A recent cyberattack forced a healthcare organization to cancel non-emergency surgeries and send some emergency patients to other facilities. In another attack, a hospital took it’s critical systems offline, impacting patient safety, requiring less efficient care methods, which also increased labor demands. It’s still impacted two years later. Cyberattacks on hospital and healthcare facilities increased…
Read MoreZero Trust Security for Building Automation: What You Need to Know
Building automation systems (BAS) are becoming increasingly common in commercial buildings, providing centralized control of building operations, including HVAC, lighting, access control, elevators, and life safety systems. While these systems can increase energy efficiency and reduce costs, they also pose significant security risks. In recent years, there have been several high-profile attacks on building automation…
Read MoreThe Importance of Protecting Smart Building Technology from Cyber Threats
Smart Building Technology Market Size Juniper Research estimates more than 115 million buildings will deploy smart building technologies by 2026, an increase of over 2.5X from 2022. Grandview Research (graph) and Fortune Business Insights both predict CAGR of over 20% through 2030 for the smart building market. Smart building technology has revolutionized the way buildings…
Read More