Three Key Ways to Ensure NERC Compliance: The $10 Million Wake Up Call
For most of us, we expect it to be as reliable as the sun coming up tomorrow. The energy that gets delivered to our homes, offices and every othe...
Read moreFor most of us, we expect it to be as reliable as the sun coming up tomorrow. The energy that gets delivered to our homes, offices and every othe...
Read moreActive is probably the biggest buzzword nowadays in the field of industrial cyber security. But what is it? How does it work? Is it safe? Do I eve...
Read moreFor most of us, we expect it to be as reliable as the sun coming up tomorrow. The energy that gets delivered to our homes, offices and every other place in-betw...
Read moreActive is probably the biggest buzzword nowadays in the field of industrial cyber security. But what is it? How does it work? Is it safe? Do I even need it?
Read moreWhile it is not a new target, many experts say that 2019 is shaping up to be the year of industrial cyber security. A confluence of factors has put OT networks ...
Read moreMany pundits believe that even though industrial control systems have been running critical infrastructure and manufacturing since the 1950s, only in the last f...
Read moreNational Security for any nation globally depends on the reliability and continuous operations of the nation’s critical infrastructure. Increased complexity and...
Read moreMy daily commute into Manhattan, as is the case with most New Yorkers, involves mass transit. There has been a highly successful campaign by the NYPD that if, o...
Read moreAnother day, another breach. It’s sarcastic, it’s satirical, but it’s also real. Barely a day goes by where we don’t hear of a new breach.
Read moreIt was only a matter of time before what befell the Information Technology (IT) community was going to affect the Operational Technology (OT) community. Today, ...
Read moreOn May 10, 2018 the NIS (Network and Information System) Directive became law in the EU. In it, Operators of Essential Services (OES) and Digital Service Provid...
Read moreA recent SANs survey polled more than 200 security professionals from energy and utilities, oil and gas, and manufacturing organizations. Less than 5% of those ...
Read moreIn December 2017 a sophisticated ICS attack known as “Triton” had been published. This attack manipulated the Triconex Safety Instrumented System (SIS) controll...
Read moreJust recently an attack known as VPNFilter hit the news. One of the locations affected by VPNFilter was a chlorine plant known as “Aul Chlorotransfer Station” i...
Read moreModern day industrial operations often span complex IT (information technology) and OT (operational technology) infrastructures. In a very standard environment,...
Read moreIt sounds obvious and has been said before, but without clear visibility into your ICS assets and the various communications occurring on the network, it's impo...
Read moreTwo years ago, when I took over my current position as Security Architect in a manufacturing company, one of the biggest challenges my new boss laid out for me ...
Read moreMost industrial organizations still consider their ICS networks to be safe from common cyber threats that mainly target IT networks. However, two recent cryptoc...
Read moreOn May 2nd, there was an announcement of disclosed vulnerabilities in two applications widely used by manufacturers and power plant operators that may provide h...
Read moreThe recently updated report by the United States Computer Emergency Readiness Team (US CERT) uncovers new information and interesting revelations regarding the...
Read moreIt’s not a matter of if, but when ……your plant gets hacked. How prepared are you for recovery?
Read moreThe words Active or Passive can mean many different things, depending on who you ask. Some may say ‘Active’ means it’s ‘blocking’ or preventing things from happ...
Read moreWhen we buy groceries at the supermarket, most of us check the ingredients and expiration dates of packaged goods.
Read moreThe emergence of cyber threats is forcing the industrial sector to take a long, hard look at how industrial control systems (ICS), and specifically industrial c...
Read moreThe digital transformation of the industrial sector, known as Industry 4.0, has brought with it a host of new cyber security challenges that previously didn't e...
Read morePharmaceutical companies are a primary target of cyber attacks. After all, formulas of new drugs are highly valuable.
Read moreSpectre and Meltdown are two newly discovered vulnerabilities that affect hardware running in the majority of the world’s computing devices. Chances are, every ...
Read moreAs 2017 comes to a close, it’s time to start preparing for 2018’s industrial cyber security tradeshows and events that are approaching.
Read moreRecently, a new malware variant, called TRITON, specifically designed to attack industrial safety systems was identified as being responsible for causing an ope...
Read moreIn the first part of this post we discussed top threats that industrial IT and OT security professionals can expect in 2018 and beyond.
Read moreIn 2018, we can expect an increase and acceleration in the connectivity and digital transformation initiatives that have taken root in the industrial sector ov...
Read moreIn industrial organizations, security is traditionally divided across three silos: physical security, IT security and operational security (plant security and s...
Read moreAttempts to Reach Industrial Control Systems and Compromise Physical Processes On October 20th, 2017, the US-CERT issued a technical alert (TA17-293A) on advanc...
Read moreAs discussed in a recent ARC Market Analysis Report, anomaly and breach detection is one of the hottest markets in industrial cybersecurity. But, as is true for...
Read moreGartner recently published the “Market Guide for Operational Technology Security”. One of the report’s key takeaways is that translating IT security practices ...
Read moreSeveral years ago, I decided to take a course on Strategic Intelligence Systems in order to solidify my ever-growing interest for the topic. My affinity for Jam...
Read moreIn case you missed the report, ICS-CERT just released their Annual 2016 Industrial Control Systems Assessment Summary Report. Leveraging NIST SP-800-53 Categori...
Read moreIn fulfillment of one of his campaign trail promises, President Trump signed off on a new a Cybersecurity Executive Order that places Critical Infrastructures, ...
Read moreOn June 27, 2017, a new malware variant named “Petya” (also known as “NotPetya” or “Nyetya”) began affecting Microsoft Windows personal computers (PCs) around ...
Read moreRecently, researchers exposed ‘CRASHOVERRIDE’ (a.k.a. Industroyer) a malware that was used in an ICS cyber attack that disrupted an insecure electrical grid in ...
Read moreLast week Honda halted production at a vehicle plant for a day after finding the WannaCry ransomware, that struck globally earlier this year, in its network. Wh...
Read moreIndegy Recognized for Innovations in Security for Industrial IoT Indegy was recognized by Gartner as a "Cool Vendor" for Industrie 4.0. We are honored and proud...
Read moreSome of the most critical assets in Industrial Control System (ICS) are the controllers, e.g. PLCs, RTUs, and DCS controllers. These devices are designed to per...
Read moreThere are lots of terms thrown around these days, such as: Internet of Things (IoT), Industrial Controls Systems (ICS), Operational Technology (OT). What this m...
Read moreThe IT/OT convergence that is propelling the Fourth Industrial Revolution has opened up a can of worms in terms of risks to IT enterprises and industrial contro...
Read moreThere has been quite a lot of buzz the past few years around Information Technology and Operations Technology (IT/OT) security convergence and its impact on bot...
Read moreThe new year is only a couple of weeks old and there have already been several ICS related security incidents in the news. The media often sensationalizes these...
Read moreWith the growing risk of ICS cyber threats, many process industry organizations are looking to secure their ICS networks. However, without fully understanding t...
Read moreAs part of our ongoing R&D efforts we occasionally discover vulnerabilities in industrial controllers (PLCs, RTUs, DCS etc.) and software tools. Recently, Indeg...
Read moreIt’s no secret that Industrial Control Systems (ICS) have become prime targets for adversaries and bad actors. In 2015, ICS operators reported more security inc...
Read moreMost industrial organizations already admit that the air-gap is disappearing. However, few still believe it is a viable security measure.
Read moreBy Guest Writer Larry Whiteside Jr. If you recall in the first part of this blog, I spoke about the challenges of Industrial Control System security (ICS securi...
Read moreAs a CISO you sometimes feel far from the trenches of cybersecurity. You begin to lose your technical chops. You begin to focus more on business impact and risk...
Read moreToo often these days we hear about cyber attacks that target critical infrastructures such as our energy and power utilities, water systems and other sensitive ...
Read moreIt’s my honor to welcome you to Indegy’s brand new website. Today marks the end of Indegy’s stealth mode era and the unveiling of the Indegy Industrial Cyber S...
Read moreLet us show you best
practices for protecting your
ICS network.
Indegy, a leader in ICS cybersecurity, protects critical infrastructure from cyber threats, malicious insiders and human error. The Indegy Cyber Security Suite arms operational technology teams with full visibility, security and control by combining hybrid, policy-based monitoring and network anomaly detection with unique device integrity checks.
Comments (0)
You can unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy