In many organizations, traditional IT and critical Operational Technology (OT) networks are being merged to take advantage of the speed and efficiency of today’s digital marketplace. Typical OT networks are comprised of switches, monitors, sensors, valves, and manufacturing devices managed

Nearly 60% of surveyed organizations using SCADA or ICS reported they experienced a breach in those systems in the last year. Here are four tips for making these systems safer. A large number of government agencies and private organizations have

Microsoft last week unveiled Trusted Cyber Physical Systems (TCPS), a new solution designed to help protect critical infrastructure against modern cyber threats. Microsoft provided the recent Triton and NotPetya attacks as examples of significant threats hitting critical infrastructure. Triton was


On a day by day basis do IOT (Internet of Things) and SCADA become more integrated in our lives. However, with the introductions of these new technologies, security issues have been evolving at an unprecedented rate. Little did manufactures of

Data diodes can create architectural complexity despite design simplicity of the data diodes themselves, but do they increase security? The concept of a data diode – a hardware device that only lets data out of the perimeter and prevents any

Endpoint security solutions today are lacking in spite of significant gaps, vulnerabilities in security and heightened fear of a security breach, says Promisec, endpoint security and compliance vendor. According to Promisec data, 89 percent of VP and C-Level IT leaders

While there are many benefits that have come to ICS and SCADA networks through the increased use of standard networking and Internet technologies, it has made the need to secure them ever more critical. Firewalls play an important role in

Energy and electric utility organizations are facing a range of challenges requiring a reevaluation of the cyber security within their industrial control networks, endpoints and controllers. On the one hand, operators have to face losing access to phone lines, securing