Here's one reason why Iranian state hackers may have been able to target Israeli-made pressure-monitoring controllers used by American water systems: Nearly 150 of the controllers are exposed to the internet - and some still use the default password 1111.
The U.S. Cybersecurity and Infrastructure Security Agency urged critical infrastructure owners to patch systems after publishing a warning that Chinese hackers are evading detection and maintaining persistent unauthorized access in U.S. information technology environments.
Remote third-party access is a particular problem in OT environments compared to IT environments, since OT often uses older legacy systems with longer replacement cycles. Nicolas Moskal provides a demonstration of practical solutions to overcome these challenges.
The Russian military hacked into surveillance cameras to spy on Ukrainian air defenses and Kyiv's critical infrastructure during the missile and drone strikes on the capital city Tuesday. Ukraine has blocked and dismantled the cameras, and it urged users to stop sharing security camera feeds online.
Legacy medical gear continues to pose big cyber challenges to healthcare entities. A joint report by the Food and Drug Administration and MITRE Corp. emphasizes the importance of entities taking a consistent risk-based approach to managing these and other devices, said Jessica Wilkerson of the FDA.
As a legacy protocol, DICOM lacks proper security measures, and as the healthcare industry modernizes and moves to the cloud, there is a significant risk of patient data exposure, said Sina Yazdanmehr, a senior IT security consultant at Aplite.
In an age reliant on operational technology, ensuring robust security for diverse industries is crucial. Join us as we discuss operational challenges, highlighting specific threats faced by businesses today. Explore how the powerful alliance between HCLTech and Microsoft empowers organizations to safeguard critical...
In the latest weekly update, editors at Information Security Media Group discuss why a growing number of U.S. and Canadian hospitals have been forced to turn away patients because of cyberattacks, innovations that have surfaced during the Israel-Hamas war and the future of industrial automation.
In partnership with the Cyentia Institute, Rockwell Automation analyzed cybersecurity events involving compromised OT/ICS, taking a deep dive into the origin and history of those events, as well as the OT implications.
Microsoft spent the past year testing how generative AI can boost productivity, accelerate learning curves and drive collaboration for itself, its partners and its customers. Microsoft infuses generative AI into every product it builds and now uses generative AI to build generative AI capabilities.
Heavy reliance on legacy systems by the manufacturing organizations have led to cyberattacks becoming more frequent, complex and nuanced over the past two years. Rockwell Automation has sought to build cyber resilience and mitigate risk in industrial operations.
Rockwell's automation efforts have moved away from a purely programmed approach to one that combines programming and self-learning based on specified parameters. Rockwell trained autonomous vehicles using real-time learning and millions of images that capture optimal behavior by human drivers.
Rockwell Automation's acquisition of industrial cybersecurity vendor Verve will help businesses better handle one of the biggest challenges with critical infrastructure: asset identification. Industrial organizations need to manage plants located all over the world, and some of them are very old.
Unveiling a vision of factory workers using AI chatbots to control the assembly line, fix production issues and develop code, Rockwell Automation plans to buy an industrial cybersecurity vendor and team up with Microsoft's generative AI practice to speed automation design and development.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.