Beyond NIST _Featured
12.10.18

Beyond the NIST Cybersecurity Framework

National Security for any nation globally depends on the reliability and continuous operations of the nation’s critical infrastructure. Increased complexity and...

Read more
Featured - What Does Industrial Cyber Security Have in Common with the NYPD_-1
11.08.18

What Does Industrial Cyber Security Have in Common...

My daily commute into Manhattan, as is the case with most New Yorkers, involves mass transit. There has been a highly successful campaign by the NYPD that if, o...

Read more
FEATURE - Cyber Security Awareness Month 2018
10.17.18

Cyber Security Awareness Month 2018: Have We Becom...

Another day, another breach. It’s sarcastic, it’s satirical, but it’s also real. Barely a day goes by where we don’t hear of a new breach.

Read more
FEATURE - The Insider Threat OT Infrastructure
10.08.18

The Insider Threat in OT Infrastructure

It was only a matter of time before what befell the Information Technology (IT) community was going to affect the Operational Technology (OT) community. Today, ...

Read more
FEATURE-EUISFACEDWITHNIS–WHICHISACTUALLYAGOODTHING! NEW
10.07.18

EU Is Faced With NIS – Which Is Actually A Good Th...

On May 10, 2018 the NIS (Network and Information System) Directive became law in the EU. In it, Operators of Essential Services (OES) and Digital Service Provid...

Read more
FEATURE-FLYINGBLINDISNOWAYTOSECUREYOUROTNETWORK - NEW
09.13.18

Flying Blind Is No Way to Secure Your OT Network

A recent SANs survey polled more than 200 security professionals from energy and utilities, oil and gas, and manufacturing organizations. Less than 5% of those ...

Read more
FEATURE - TRITON UNWRAPPED_ INDEGY LABS ANALYSIS
08.14.18

Triton Unwrapped; Indegy Labs Analysis

In December 2017 a sophisticated ICS attack known as “Triton” had been published. This attack manipulated the Triconex Safety Instrumented System (SIS) controll...

Read more
FEATURE - Filtering the Facts on VPN Filter
08.01.18

Filtering the Facts on VPNFilter

Just recently an attack known as VPNFilter hit the news. One of the locations affected by VPNFilter was a chlorine plant known as “Aul Chlorotransfer Station” i...

Read more
MAIN FEATURE - MIND THE GAP - A ROADMAP TO IT2FOT ALIGNMENT
07.03.18

Mind the Gap - a Road to IT/OT Alignment

Modern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. In a very standard environment,...

Read more
MAIN FEATURE - LOOKING TO IMPROVE YOUR ICS SECURITY STRATEGY_ TRY ACTIVE MONITORING
06.06.18

Looking to Improve your ICS Security Strategy? Try...

It sounds obvious and has been said before, but without clear visibility into your ICS assets and the various communications occurring on the network, it's impo...

Read more
FEATURE - ICS_SCADA SECURITY FOR BEGINNERS – QUICK KNOWLEDGE TO SURVIVE THE INDUSTRIAL CONTROL LANDSCAPE
05.15.18

ICS/SCADA Security For Beginners – Quick Knowledge...

Two years ago, when I took over my current position as Security Architect in a manufacturing company, one of the biggest challenges my new boss laid out for me ...

Read more
FEATURE-ISMALWAREHIDINGINYOURICSNETWORK_- NEW
05.14.18

Is Malware hiding in your ICS Network?

Most industrial organizations still consider their ICS networks to be safe from common cyber threats that mainly target IT networks. However, two recent cryptoc...

Read more
FEATURE - WHAT THE VULNERABILITIES IN SCHNEIDER ELECTRIC TOOLS MEAN FOR ICS SECURITY
05.03.18

What the Vulnerabilities in Schneider Electric Too...

On May 2nd, there was an announcement of disclosed vulnerabilities in two applications widely used by manufacturers and power plant operators that may provide h...

Read more
FEATURE - US_ RUSSIAN GOVERNMENT HACKERS ARE TARGETING AMERICA_S CRITICAL INFRASTRUCTURE SECTORS
04.29.18

US: Russian Government Hackers are Targeting Ameri...

The recently updated report by  the United States Computer Emergency Readiness Team (US CERT) uncovers new information and interesting revelations regarding the...

Read more
FEATURE_HACKERSARETARGETINGICSSYSTEMS.HOWPREPAREDAREYOUFORRECOVERY - NEW_
04.09.18

Hackers are Targeting ICS Systems. How Prepared ar...

It’s not a matter of if, but when ……your plant gets hacked. How prepared are you for recovery? 

Read more
FEATURE -The 90s Called – They want their Passive-Only monitoring solutions back
03.29.18

The 90s Called – They Want their Passive-Only Moni...

The words Active or Passive can mean many different things, depending on who you ask. Some may say ‘Active’ means it’s ‘blocking’ or preventing things from happ...

Read more
FEATURE - WHY FOOD _ BEVERAGE COMPANIES SHOULD CRACK DOWN ON CYBER THREATS TO ICS
02.19.18

Why Food & Beverage Companies Should Crack Down on...

When we buy groceries at the supermarket, most of us check the ingredients and expiration dates of packaged goods.

Read more
FEATURE - THE CHALLENGES OF SECURING INDUSTRIAL CONTROL SYSTEMS FROM CYBER ATTACKS
02.14.18

The Challenges of Securing Industrial Control Syst...

The emergence of cyber threats is forcing the industrial sector to take a long, hard look at how industrial control systems (ICS), and specifically industrial c...

Read more
FEATURE-10 CYBERSECURITY INFLUENCERS INSIGHTS 2018
02.06.18

10 Industrial Cyber Security Influencers Offer Exp...

The digital transformation of the industrial sector, known as Industry 4.0, has brought with it a host of new cyber security challenges that previously didn't e...

Read more
FEATURE - Securing Pharmaceutical Manufacturing Against Cyber Threats!
01.25.18

Securing Pharmaceutical Manufacturing Against Cybe...

Pharmaceutical companies are a primary target of cyber attacks. After all, formulas of new drugs are highly valuable. 

Read more
FEATURE - THE IMPACT OF SPECTRE AND MELTDOWN ON INDUSTRIAL AND CRITICAL INFRASTRUCTURE
01.16.18

The Impact of Spectre and Meltdown on Industrial a...

Spectre and Meltdown are two newly discovered vulnerabilities that affect hardware running in the majority of the world’s computing devices. Chances are, every ...

Read more
FEATURE-12INDUSTRIALCYBERSECURITYEVENTSYOUSHOULDN_TMISSIN2018 - New
01.08.18

12 Industrial Cyber Security Events You Shouldn't ...

As 2017 comes to a close, it’s time to start preparing for 2018’s industrial cyber security tradeshows and events that are approaching.

Read more
FEATURE-TRITON MALWARE_INDUSTRIALCONTROLLERSARENOLONGER SAFE ATTACKS
12.21.17

TRITON Malware: Industrial Controllers are No Long...

Recently, a new malware variant, called TRITON, specifically designed to attack industrial safety systems was identified as being responsible for causing an ope...

Read more
FEATURE-INDUSTRIALCYBERSECURITYPREDICTIONSFOR2018(PARTONE) - NEW
12.06.17

Industrial Cyber Security Predictions for 2018 (Pa...

In the first part of this post we discussed top threats that industrial IT and OT security professionals can expect in 2018 and beyond. 

Read more
FEATURE-INDUSTRIALCYBERSECURITYPREDICTIONSFOR2018(PARTONE) - NEW
12.05.17

Industrial Cyber Security Predictions for 2018 (Pa...

 In 2018, we can expect an increase and acceleration in the connectivity and digital transformation initiatives that have taken root in the industrial sector ov...

Read more
FEATURE - THE FUTURE OF INDUSTRIAL SECURITY - IT AND OT CONVERGENCE
11.01.17

The Future of Industrial Security - IT and OT Conv...

In industrial organizations, security is traditionally divided across three silos: physical security, IT security and operational security (plant security and s...

Read more
FEATURE - ADVANCED PERSISTENT THREAT ACTIVITY TARGETING ENERGY AND OTHER CRITICAL INFRASTRUCTURE SECTORS
10.23.17

Advanced Persistent Threat Activity Targeting Ener...

Attempts to Reach Industrial Control Systems and Compromise Physical Processes On October 20th, 2017, the US-CERT issued a technical alert (TA17-293A) on advanc...

Read more
FEATURE - ANOMALY AND BREACH DETECTION EMPOWERS CYBERSECURITY EFFORTS
10.20.17

Anomaly and Breach Detection Empowers Cybersecurit...

As discussed in a recent ARC Market Analysis Report, anomaly and breach detection is one of the hottest markets in industrial cybersecurity. But, as is true for...

Read more
FEATURE - Indegy’s Take on Gartner’s Market Guide for Operational Technology Security 2017
08.30.17

Indegy’s Take on Gartner’s Market Guide for Operat...

 Gartner recently published the “Market Guide for Operational Technology Security”. One of the report’s key takeaways is that translating IT security practices ...

Read more
FEATURE - THE INTELLIGENCE CYCLE_ SECURITY INFORMATION IN MOTION (1)
08.22.17

The Intelligence Cycle: Security Information in Mo...

Several years ago, I decided to take a course on Strategic Intelligence Systems in order to solidify my ever-growing interest for the topic. My affinity for Jam...

Read more
FEATURE - ICS-CERT Annual ICS Summary Report 2016
07.18.17

About the ICS-CERT Annual ICS Summary Report 2016

In case you missed the report, ICS-CERT just released their Annual 2016 Industrial Control Systems Assessment Summary Report. Leveraging NIST SP-800-53 Categori...

Read more
FEATURE - WHAT THE NEW EXECUTIVE ORDER REALLY MEANS FOR CRITICAL INFRASTRUCTURE
07.06.17

What the New Executive Order Really Means for Crit...

In fulfillment of one of his campaign trail promises, President Trump signed off on a new a Cybersecurity Executive Order that places Critical Infrastructures, ...

Read more
FEATURE - Petya The Ransomware That can Wipe Out Your ICS Automation Systems and Files
07.03.17

Petya: The Ransomware That Can Wipe Out Your ICS A...

 On June 27, 2017, a new malware variant named “Petya” (also known as “NotPetya” or “Nyetya”) began affecting Microsoft Windows personal computers (PCs) around ...

Read more
FEATURE-DETECTINGANDMITIGATINGCRASHOVERRIDE - NEW
06.30.17

Detecting and Mitigating CRASHOVERRIDE: ICS-Tailor...

Recently, researchers exposed ‘CRASHOVERRIDE’ (a.k.a. Industroyer) a malware that was used in an ICS cyber attack that disrupted an insecure electrical grid in ...

Read more
FEATURE - WHY WANNACRY WAS A WAKE UP CALL FOR CRITICAL INFRASTRUCTURE SECURITY-1
06.27.17

Why WannaCry Was a Wake Up Call for Critical Infra...

Last week Honda halted production at a vehicle plant for a day after finding the WannaCry ransomware, that struck globally earlier this year, in its network. Wh...

Read more
FEATURE - Indegy’s Take on Gartner’s Market Guide for Operational Technology Security 2017
06.15.17

How “Cool” is Indegy? - Very, According to Gartner

Indegy Recognized for Innovations in Security for Industrial IoT Indegy was recognized by Gartner as a "Cool Vendor" for Industrie 4.0. We are honored and proud...

Read more
FEATURE - WHY MUST INDUSTRIAL CONTROLLERS BE PROTECTED_
06.07.17

Why Must Industrial Controllers be Protected?

Some of the most critical assets in Industrial Control System (ICS) are the controllers, e.g. PLCs, RTUs, and DCS controllers. These devices are designed to per...

Read more
FEATURE - SECURING THE INDUSTRIAL INTERNET OF THINGS
04.04.17

Securing The Industrial Internet Of Things

There are lots of terms thrown around these days, such as: Internet of Things (IoT), Industrial Controls Systems (ICS), Operational Technology (OT). What this m...

Read more
FEATURE - A TALE OF TWO GIANTS
03.23.17

A Tale Of Two Giants (beta)

The IT/OT convergence that is propelling the Fourth Industrial Revolution has opened up a can of worms in terms of risks to IT enterprises and industrial contro...

Read more
FEATURE - BUILDING A SUCCESSFUL INDUSTRIAL SECURITY STRATEGY IN A CONVERGING IT_OT WORLD
03.15.17

Building a Successful Industrial Security Strategy...

There has been quite a lot of buzz the past few years around Information Technology and Operations Technology (IT/OT) security convergence and its impact on bot...

Read more
FEATURE-WHAT_S AHEAD ICS CYBERSECURITY IN 2017
01.23.17

What's Ahead for ICS Cyber Security in 2017

The new year is only a couple of weeks old and there have already been several ICS related security incidents in the news. The media often sensationalizes these...

Read more
FEATURE - MANAGING CRITICAL ASSETS IN ICS NETWORKS
12.14.16

Managing Critical Assets in ICS Networks

With the growing risk of ICS cyber threats, many process industry organizations are looking to secure their ICS networks. However, without fully understanding t...

Read more
FEATURE - NEW SCADA VULNERABILITY ENABLES REMOTE CONTROL OF ICS NETWORKS
10.25.16

New SCADA Vulnerability Enables Remote Control of ...

As part of our ongoing R&D efforts we occasionally discover vulnerabilities in industrial controllers (PLCs, RTUs, DCS etc.) and software tools. Recently, Indeg...

Read more
FEATURE - Do You Know What the Top 3 ICS Security Threats Are__
09.01.16

Do You Know What the Top 3 ICS Security Threats Ar...

It’s no secret that Industrial Control Systems (ICS) have become prime targets for adversaries and bad actors. In 2015, ICS operators reported more security inc...

Read more
FEATURE - THE INDUSTRIAL NETWORK AIR-GAP
08.16.16

The Industrial Network Air-Gap: Viable Security St...

Most industrial organizations already admit that the air-gap is disappearing. However, few still believe it is a viable security measure. 

Read more
FEATURE - INDUSTRIAL CYBER SECURITY - A CISO PERSPECTIVE (PART 1)
05.31.16

The CISO Perspective on Industrial Cyber Security ...

By Guest Writer Larry Whiteside Jr. If you recall in the first part of this blog, I spoke about the challenges of Industrial Control System security (ICS securi...

Read more
FEATURE - INDUSTRIAL CYBER SECURITY - A CISO PERSPECTIVE (PART 1)
04.08.16

Industrial Cyber Security - a CISO perspective (Pa...

As a CISO you sometimes feel far from the trenches of cybersecurity. You begin to lose your technical chops. You begin to focus more on business impact and risk...

Read more
FEATURE-HOWMALWAREREALLYOPERATESINICSNETWORKATTACKS - NEW
02.29.16

How Malware Really Operates in ICS Network Attacks

Too often these days we hear about cyber attacks that target critical infrastructures such as our energy and power utilities, water systems and other sensitive ...

Read more
FEATURE - WELCOME TO INDEGY
02.05.16

Welcome to Indegy

 It’s my honor to welcome you to Indegy’s brand new website. Today marks the end of Indegy’s stealth mode era and the unveiling of the Indegy Industrial Cyber S...

Read more

Comments (0)

You can unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy