Hackers used novel malware to knock out the heating system for 600 apartment buildings during the winter in Ukraine, in a development that poses a wider threat for critical infrastructure. Cybersecurity researchers at Dragos on Tuesday dubbed the new malware "FrostyGoop."
The interconnectedness of medical devices, which generate data that can be distributed to multiple systems that are often managed by different policies, presents privacy concerns that device manufacturers must address, said Adam Hesse, CEO of Full Spectrum.
A new artificial intelligence-based protection system developed by the German government-funded SecDER project is revolutionizing the security of virtual power plants by detecting cyberattacks and predicting failures, according to Fraunhofer SIT Institute Darmstadt.
The deployment of an asset management platform is helping Main Line Health gain deeper visibility and better security over the 100,000-plus medical devices and IoT gear used throughout the group's multiple hospitals and medical facilities, said CISO Aaron Weismann, who discusses the implementation.
Fortinet is out with its latest State of Operational Technology and Cybersecurity report. The good news: More organizations are paying attention to OT: The bad: Not enough are securing it properly. Fortinet's Richard Springer analyzes the research findings.
Multiple critical vulnerabilities in Emerson Rosemount 370XA gas chromatographs could allow malicious actors to access sensitive data, cause denial-of-service conditions and execute arbitrary commands. Emerson recommends that end users update the firmware on the products.
Cisco remained atop Forrester's OT security rankings, Palo Alto Networks climbed into the leader space, and Claroty and Tenable fell to strong performer. The transition from a network-centric to an asset- and data-centric security model has introduced challenges, especially with legacy equipment.
In the latest weekly update, ISMG editors discussed critical infrastructure security challenges, a report on the 2022 Medibank breach compromising personal data for 10 million people, and Fortinet's acquisition to integrate Lacework's cloud-native security into its Security Fabric and SASE platform.
Cyber resilience has become more crucial than ever. Erwin Eimers, general manager, IT and cybersecurity and CIO/CISO of Sumitomo Chemical America, emphasized the importance of preparing for compromises and breaches, rather than just preventing them.
Cybersecurity workforce development is critical as IT and OT converge. Sean McBride, director of the informatics research institute at Idaho State University, advises organizations to train people with the "skills, attitudes and behaviors" to manage and protect critical systems.
The U.S. National Institute of Standards and Technology wants public feedback on the first draft publication of a new project that aims to better secure the water and wastewater sectors from emerging cyberthreats by focusing on common concerns affecting operational technology assets.
Cyber Florida: The Florida Center for Cybersecurity helps enhance cybersecurity resilience by assisting understaffed critical infrastructure entities across Florida. Ambassador Roland Miller emphasized the importance of helping smaller entities improve their cybersecurity defenses.
Modern security challenges such as increased remote work and interconnected applications demand robust strategies. Todd Beebe, information security officer at Freeport LNG, shared insights on developing cybersecurity programs for OT environments.
Anthony Perry, director IT and OT/IoT security at FedEx, shared strategies for developing robust OT security programs. At FedEx, the focus on OT and IoT security has grown over the past several years, driven by the need to protect the company's automation processes, Perry said.
Security leaders face significant challenges in securing OT environments, especially with increasing geopolitical disruptions and psychological barriers. Trish McGill, IT and OT cybersecurity expert at Ilionx, emphasized the importance of addressing these psychological factors to bridge the IT-OT divide.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.