The widely used NicheStack TCP/IP stack has 14 vulnerabilities that, if exploited, could allow for remote code execution, denial of service, information leaks, TCP spoofing or DNS cache poisoning, according to researchers at Forescout and JFrog. But patches are now available.
Your life sciences facility of the future requires comprehensive cybersecurity that goes beyond traditional IT systems, an industrial DMZ, and even a defense-in-depth strategy.
While more connection points bring a huge competitive advantage, they also create a greater attack surface to protect. You need to be...
The growing adoption of smart manufacturing and connected operations combined with today’s highly robust threat landscape requires a renewed commitment to industrial security.
With Defense-in-Depth security, you can better secure your organization at all levels. This eBook touches on every level of threat...
Industrial companies around the world are undergoing a digital transformation and moving toward smart manufacturing. The value of smart manufacturing begins with a secure and reliable infrastructure.
This eBook provides a step-by-step playbook of the journey toward connection by mapping your journey, setting...
You can enhance your security posture of your connected enterprise with threat detection services that help improve the visibility of a connected plant floor by continuous monitoring of OT/IT assets.
This white paper discusses considerations for each phase of the attack continuum. These key insights cover the...
The lack of adequate security features in critical electric grid equipment that's made in other nations poses a serious U.S. cybersecurity threat, federal officials said this week. Supply chain attacks could take down the grid and result in a lengthy recovery period, they told Congress.
A bipartisan group of senators is pushing a bill that would require CISA to identify and respond to vulnerabilities and threats that target industrial control systems. The House has already passed a similar measure.
In the world of operational technology (OT), one small change or networking issue can have a significant effect on production, automation systems and even safety. Staying on top of what’s happening in the control network is mission critical – but one can’t monitor and manage what you can’t see.
U.S. water treatment facilities are increasingly vulnerable to cyberthreats to their IT networks as well as their OT systems, according to experts who testified at a Senate committee hearing this week.
Transportation and logistics organizations are rapidly evolving to improve their service levels and
efficiency. At the same time, safety has never been more important, as risks from cyber threats
increase. The World Economic Forum cited cyberattacks on critical infrastructure, including
transportation, as the...
To improve cyber resilience, many utilities are evaluating
options for augmenting the cybersecurity of their OT and
IoT networks. One fundamental security best practice is
having real-time visibility into cybersecurity attacks, risks
This paper illustrates how a network visibility...
Ransomware-wielding criminals continue to find innovative new ways to extort victims, develop technically and sidestep skills shortages by delivering ransomware as a service, said Robert Hannigan, the former head of U.K. intelligence agency GCHQ, in his Infosecurity Europe 2021 virtual keynote speech.
The ransomware attack against Colonial Pipeline, which has disrupted the flow of gasoline and other petroleum products throughout the eastern U.S. since Friday, is prompting members of Congress to call for new cybersecurity regulations and ask probing questions about regulators' scrutiny of security measures.
For anyone wondering how the Russian-speaking, ransomware-wielding DarkSide crime syndicate was able to disrupt a major U.S. fuel pipeline, a more pertinent question might be: Why didn’t it happen sooner?
CISA is still awaiting more technical details from Colonial Pipeline about the Friday ransomware attack that forced it to shut down its operations, Brandon Wales, the agency's acting director, told a Senate committee that's probing the attack and other cybersecurity incidents.