In August 2022, the threat intelligence and cybersecurity company Cyble found 8,000 virtual network computing (VNC) instances exposed online. Additionally, this research revealed that most of these ports are in…
Browsing Categoryoperational technology
Now You SIEM, Now You Don’t —Six Failures of Cybersecurity
Security information and event management (SIEM) frameworks are essential for enterprises to monitor, manage and mitigate the impact of evolving cyberattacks. As the number of threats and the financial impact…
Why Operational Technology Security Cannot Be Avoided
Operational technology (OT) includes any hardware and software that directly monitors and controls industrial equipment and all its assets, processes and events to detect or initiate a change. Yet despite…
Why Operational Technology Security Cannot Be Avoided
Operational technology (OT) includes any hardware and software that directly monitors and controls industrial equipment and all its assets, processes and events to detect or initiate a change. Yet despite…
X-Force 2022 Insights: An Expanding OT Threat Landscape
This post was written with contributions from Dave McMillen. So far 2022 has seen international cyber security agencies issuing multiple alerts about malicious Russian cyber operations and potential attacks on…
U.S. Cybersecurity Policy Has Changed Since the Colonial Pipeline Attack
More than a year ago, a ransomware attack made the news across the nation. The Colonial Pipeline Company announced on May 7, 2021, that the DarkSide Ransomware-as-a-Service group, based in…
One Year After the Colonial Pipeline Attack, Regulation Is Still a Problem
The Colonial Pipeline cyberattack is still causing ripples. Some of these federal mandates may mark major changes for operational technology (OT) cybersecurity. The privately held Colonial Pipeline company, which provides…
Where Everything Old is New Again: Operational Technology and Ghost of Malware Past
This post was written with contributions from IBM Security’s Sameer Koranne and Elias Andre Carabaguiaz Gonzalez. Operational technology (OT) — the networks that control industrial control system processes — face…
Log4Shell Vulnerability Risks for OT Environments — and How You Can Better Protect Against Them
You’d have to look far and wide to find an IT professional who isn’t aware of (and probably responding to) the Log4Shell vulnerability. The Operational Technology (OT) sector is no…
IoT Security: Protecting Food and Agriculture Organizations
Ransomware actors are targeting food and agriculture organizations, potentially disrupting business. Luckily, there are already formal structures in place to boost the IoT security defenses they need. Knowing them keeps…