Your one-stop web resource providing safety and security information to manufacturers

WhitePapers

A Year in Vulnerabilities

In 2017, Dragos tracked 163 vulnerability advisories with an industrial control system (ICS) impact. Of these, the majority were vulnerabilities in insecure- by-design products which are typically deep within an ICS network. Dragos found that public re …

A Year in Threats

Last year represented a defining year in ICS security: Two major and unique ICS-disruptive attackers were revealed; five distinct activity groups targeting ICS networks were identified; and several large-scale IT infection events with ICS implications …

Year in Hunting and Responding

By Ben Miller This past year has shown that industrial attacks are being commoditized through new malware with real-world impacts to reliability and safety. The ICS community needs to mature from a reactive to a proactive position with mature detection …

Finding the Competitive Edge

Monitoring Applications Gives Visibility, and can Help Hike Performance in a Very Big Way Not too long ago, ExxonMobil came out with a plan where hardware is merely plug and play, totally open and non-proprietary, where if a device fails, you can simpl …

Going Digital

Smarter, Connected Networks Add Complexity, but Plant Floor Can’t be an Island Anymore A smart, connected enterprise can embrace the digital transformation in the coming Industrial Internet of Things (IIoT) world by collecting data that could result in …

Visibility Leads to Knowledge

Learn how to Boost Process Performance, Fix Hidden Network Issues, View Alerts for Increasing Amount of Cybersecurity Threats Knowledge is king in the industrial manufacturing environment today as decisions need to occur with 20/20 vision, no blind spo …

Tips to SCADA Security

SCADA security is paramount as networking continues to evolve and grow through the use of the Internet. Along those lines the European Union Agency for Network and Information Security (ENISA), continuing the work on communication network dependencies …

Insurance Dilemma: Infrastructure Attacks

Cybersecurity is One Thing, but Figuring Out Where Insurance Fits into the Big Picture is Not So Simple These Days There was a period of time not too long ago when insurers had an easier time deciding on how much protection a manufacturing operation ne …

Monitoring a Growing Network

In IIoT Realm, Auditing, Compliance a Vital Concern Whether it is a mandatory industry compliance regulation or a company-wide rule, knowing what you have on the system and ensuring it is working is a must in these days of growing networks. Audit and c …

Integrated Approach to Protecting ICS

Introducing IT capabilities into the industrial control system environment brings with it complex security implications and makes OT systems vulnerable to cyber attacks. On top of that, systems are complicated webs of proprietary protocols, interfaces …

Analytics through Network Monitoring

Archiving, Pulling Real-Time Statistics Boosts Big Data Capabilities Big Data is thriving with multiple levels of information cascading across networks on a global basis with the direct intent to hike business efficiency and productivity while profits …

Gaining Visibility on Malware Attacks

Network Monitoring can Help Ward Off Costly, Sophisticated Assaults Fighting off malware and the havoc it can wreak on a system ends up being a cost that can truly hurt any manufacturer and the catch is, with smarter, more sophisticated types of attack …

The Wireless Edge

Network Monitoring 101: Cost savings, productivity, growth, and profitability Much to the surprise of workers at one major oil and gas organization, they found over 250,000 network interfaces that never carried traffic at all. A big proponent of wirele …

Benefits of Virtualization

Visibility into Network Allows for Cost Savings, Reduced Downtime A manufacturing executive’s goals are simple in the end: Increase profits, while at the same time achieving reduced costs. Of course, reaching those goals is incredibly complex and invol …

Wireless Reshaping IT/OT Network

Wireless has been a part of networking for more than a decade, so it isn’t a new thing for network administrators to be aware of. But which wireless? What industry standard will be used? And what data and format must be captured and stored. These will …

Virtualizing Network: Benefits, Challenges

Virtualization has significant benefits both in computing and in networking. This is especially true in OT networking and control systems, where the rest of the system is intended to live for 30 years, and the life of the computer and network component …

IT/OT Convergence – Bridging the Gap

What will it take? Will Operational Technology (OT) disappear as we know it today – morphed into the Informational Technology (IT) space where both areas are driven by the same disruptive technology of the IoE (Internet-of-Everything)? Are IT and OT tw …

Cisco 2014 Annual Security Report

All companies are hosting malware of some kind, a new survey found. One hundred percent of companies end up calling malicious malware hosts, according to Cisco’s 2014 Annual Security Report. Cisco also believes that the length of time that such activit …

The ICS Cybersecurity Lifecycle

With the ever changing threats posed by cyber events of any nature, it has become critical to recognize these emerging threats, malicious or not, and identify the consequences these threats may have on the operation of an industrial control system (ICS …

CoDeSys Vulnerabilities Analysis

A number of security vulnerabilities in the CoDeSys Control Runtime System were disclosed in January 2012. In October 2012, fully functional attack tools were also released to the general public. While CoDeSys is not widely known in the SCADA and ICS f …

Pin It on Pinterest