In the past decade, we have seen an alarming increase in attacks on critical energy infrastructure, with cyber incidents occurring across any number of geographies and industries. Common attacks can involve ransomware on a corporation’s Information Technology (IT) network that controls business operations, or a direct attack on a corporation’s Operational Technology (OT) systems that control industrial infrastructure.
What the American Jobs Plan Could Mean for Critical Infrastructure Cybersecurity
If carried out as described, the actions proposed in the American Jobs Plan will help to bolster the cybersecurity posture of American critical infrastructure, however they do not go far enough to address the vast scale and scope of the problem we are facing.
Why Level 0/1 Serial Communications Monitoring is a First Step to Digital Transformation
As far as legacy Industrial Control Systems (ICS) are concerned, level 0/1 serial communications monitoring isn’t just about network security; it’s also about utilizing the data as a “first step” to digital transformation.
Ignoring Cyber Risk is Dangerous to Society and Your Bottom Line
To anyone working in cybersecurity, it is not news that just about every critical infrastructure industry is significantly behind on their path toward cybersecurity maturity. There continues to be a fundamental friction between the estimation of cyber risk and the short-term thinking of today’s quarterly budgetary decisions.
The Biggest Roadblocks to Digital Transformation in Manufacturing
There are several considerable roadblocks to safe and secure digital transformations efforts in manufacturing, or any industrial application where safety, security and reliability are paramount. At a high-level these areas include: Cybersecurity, Data Integration, and IT/OT interoperability and Integration.
IT/OT Convergence: Reducing Cyber Exposure of Legacy Assets
In July 2020, the National Security Agency (NSA) and Cybersecurity & Infrastructure Security Agency (CISA) issued a joint cybersecurity advisory recommending “Immediate Actions to Reduce Exposure Across all Operational Technologies and Control Systems.” The advisory emphasized “cyber actors have demonstrated their continued willingness to conduct malicious cyber activity against Critical Infrastructure (CI) by exploiting Internet-accessible […]
Reassessing our Critical Infrastructure’s Cyber-Physical Security Posture
By Richard Robinson, CEO, Cynalytica I am not sure how many more wake up calls it will take before we all start to acknowledge that we are considerably behind in our protection of Industrial Control System environments for our Nations Critical Infrastructure. The recent compromise of Solarwinds and the Sunburst Hack should shake this fact […]
Serial to Ethernet Converters: How Widely Used Industrial Devices are Providing Malicious Threat Actors with a Gateway to Cyber-Physical Assets
In industrial automation, Serial to Ethernet Converters/Gateways and Serial Device Servers are a long-established and widely used method for enabling remote communications and monitoring of devices that only support serial interfaces such as RS-232, RS-485, and RS-422 to name a few. The devices are typically used to convert serial to ethernet protocols (and vice versa) […]
The Security Gap that ICS Cybersecurity Companies Refuse to Talk About
Cyber attacks on critical infrastructure’s Industrial Control Systems (ICS) are still on the rise due, for the most part, to the increase in cybercrime and geopolitical tensions – tensions that ironically were fueled by a barrage of cyber campaigns focused on compromising essential services over the past decade. Exacerbating the problem is the rate at […]