Gas Pipeline

Colonial Pipeline Attack Debrief: Critical Infrastructure Attacks Will Get Worse Before They Get Better

In the past decade, we have seen an alarming increase in attacks on critical energy infrastructure, with cyber incidents occurring across any number of geographies and industries. Common attacks can involve ransomware on a corporation’s Information Technology (IT) network that controls business operations, or a direct attack on a corporation’s Operational Technology (OT) systems that control industrial infrastructure.

dice on financial newspaper spelling profit, loss, risk

Ignoring Cyber Risk is Dangerous to Society and Your Bottom Line

To anyone working in cybersecurity, it is not news that just about every critical infrastructure industry is significantly behind on their path toward cybersecurity maturity. There continues to be a fundamental friction between the estimation of cyber risk and the short-term thinking of today’s quarterly budgetary decisions.

Digital Transformation

The Biggest Roadblocks to Digital Transformation in Manufacturing

There are several considerable roadblocks to safe and secure digital transformations efforts in manufacturing, or any industrial application where safety, security and reliability are paramount. At a high-level these areas include: Cybersecurity, Data Integration, and IT/OT interoperability and Integration.

woman pointing towards icons related to IT/OT convergence and industry 4.0

IT/OT Convergence: Reducing Cyber Exposure of Legacy Assets

In July 2020, the National Security Agency (NSA) and Cybersecurity & Infrastructure Security Agency (CISA) issued a joint cybersecurity advisory recommending “Immediate Actions to Reduce Exposure Across all Operational Technologies and Control Systems.” The advisory emphasized “cyber actors have demonstrated their continued willingness to conduct malicious cyber activity against Critical Infrastructure (CI) by exploiting Internet-accessible […]

critical infrastructure

Reassessing our Critical Infrastructure’s Cyber-Physical Security Posture

By Richard Robinson, CEO, Cynalytica I am not sure how many more wake up calls it will take before we all start to acknowledge that we are considerably behind in our protection of Industrial Control System environments for our Nations Critical Infrastructure.  The recent compromise of Solarwinds and the Sunburst Hack should shake this fact […]

cyber security serial converters

Serial to Ethernet Converters: How Widely Used Industrial Devices are Providing Malicious Threat Actors with a Gateway to Cyber-Physical Assets

In industrial automation, Serial to Ethernet Converters/Gateways and Serial Device Servers are a long-established and widely used method for enabling remote communications and monitoring of devices that only support serial interfaces such as RS-232, RS-485, and RS-422 to name a few. The devices are typically used to convert serial to ethernet protocols (and vice versa) […]

ics network security gap

The Security Gap that ICS Cybersecurity Companies Refuse to Talk About

Cyber attacks on critical infrastructure’s Industrial Control Systems (ICS) are still on the rise due, for the most part, to the increase in cybercrime and geopolitical tensions – tensions that ironically were fueled by a barrage of cyber campaigns focused on compromising essential services over the past decade.  Exacerbating the problem is the rate at […]