TRITON/TRISIS Emerges from Shadows Once Again

As many are aware, TRITON/TRISIS is back in the news.  Another critical infrastructure organization was infiltrated with the same penetration framework used in the original attack documented in late 2017.  In this most recent case, the framework was found on the IT network and had yet to reach the OT network. The attackers were conducting reconnaissance and were working to penetrate deeper with the goal of... Read more

Wrong Conversation

The Wrong Conversation: Passive vs. Active Network Detection for OT Inventory

When it comes to ICS cybersecurity, are you having the wrong conversation? Over the last few years, OT cybersecurity industry professionals have spent countless hours debating active versus passive network detection for OT asset inventory collection. However, this is not the right conversation. Though network detection can provide some visibility into ICS assets, the view provided by network detection tools is limited at... Read more

Reducing Risk in a Converging IT/OT World

Industrie 4.0 and the rapid expansion of the Internet of Things (IoT) require increased access to the Operational Technology (OT) that propels production. Twenty to thirty years ago, assets were proprietary, different for every vendor, and offered limited connectivity to third party systems. Over time, owner-operators demanded more openness and access to these proprietary systems. As a result, vendors are using more... Read more

Perspectives from S4 in Miami

I attended the S4 ICS Security conference in Miami last week and really enjoyed the different perspectives and priorities people have for securing control systems. Many vendors and end users were in attendance, and it was a great forum to exchange ideas. Hats off to Digital Bond for creating an event that provides such a collaborative environment.  Below are some of the key messages I took from the... Read more

Don’t Lose Sight of the Forest for the Trees

In a recent interview with Chemical Processing magazine, I was asked about complying with alarm management standards such as ISA 18.2 and IEC 62682. I emphasized the obvious importance of complying with these standards. With compliance a given, we must guard against missing the forest for the trees. Striving for improved Operator Effectiveness (the forest) is the greater goal and focusing strictly on... Read more

Displaying results 1-5 (of 6)
 |<  < 1 2  >  >| 

This site would like to place a cookie on your browser to help us better deliver relevant and valuable content to you.