New research highlights an increase in the number of cyber-attacks on ICS computers in the oil and gas and building automation industries, as the number of attacks in other industries declined.
Most people think of state-level actors when they think of threats to ICS networks. China, Russia, and others certainly represent threats to America’s critical infrastructure and any type of operational networks that you may be operating, but they aren’t necessarily the biggest threat to you.
IT Security has matured rapidly over the past decade in order to counter escalating threats, but this level of rapid maturation hasn’t been matched in the ICS Security arena, and there are 5 basic reasons why.
Convergence of physical and cyber has been a pop-up topic for many years, but not a lot of rigor has been put into looking at the problem academically and practically.
Remote access and work–from–home solutions present unique challenges for power generation plants and substations controlled by ICS/SCADA networks. The threat from COVID-19 has changed the way that we work and is forcing many organizations to look for new ways for their operators and engineers to access their networks.
Water and waste-water treatment plants are unique environments with challenging ICS and SCADA network requirements. The threat from COVID-19 has prompted many plant operators to consider expanding remote access into their environments.
Today, more than ever before, automation teams are faced with reality that remote access into your ICS system is required. Due to the outbreak of Coronavirus (COVID-19) the automated industry that we have all grown to love is facing a real issue.
Over the past few days, we have looked at 3 very different Iranian hacker groups that operated in very different ways. We have had some great conversations with our clients and partners about the different ways that we can all protect ourselves from these threats.
So far, we have looked at 2 very different Iranian hacker groups that operated in very different ways. Today, we are continuing our quick overview of the most likely Iranian hacker threats that you may face in the next few weeks.