As threats to industrial environments rise, the digitalization of electric utilities, oil & gas, and manufacturing networks have blurred IT and OT boundaries, expanding the attack surface. Threat groups like VOLTZITE (overlaps with Volt Typhoon/Vanguard Panda) exploit this by pivoting through the IT networks and...
As concerns grow about China's cyberthreat to U.S. critical infrastructure, Scythe founder and CEO Bryson Bort suggests the actual risk may not be as severe as feared. He explains the factors that might limit China's cyber activities and the real strategic vulnerabilities that could be targeted.
Aftin Ross, deputy director of the Office of Readiness and Response at FDA's Center for Devices and Radiological Health, discusses the latest medical device cybersecurity regulations, industry collaboration and manufacturers' efforts to address vulnerabilities and ensure patient safety.
Cyber threats against the U.S. water sector are growing but the main federal regulatory agency that oversees it may be stymied by a lack of cooperation from sector operators, concludes a Government Accountability Office report. Attacks against the water sector have mounted steadily.
We’ve talked a lot about the convergence of networking and security over the years. It is a natural evolution to turn to connecting and securing OT environments and cyber-physical systems. Fortinet's John Maddison opens up on the debut of Fortinet's new OT Security Platform.
A vulnerability in Rockwell Automation's ControlLogix 1756 devices allows attackers to bypass a critical security feature, turning the trusted slot mechanism into a hacker's secret passageway to jump between slots and gain access to industrial control systems.
Hackers used novel malware to knock out the heating system for 600 apartment buildings during the winter in Ukraine, in a development that poses a wider threat for critical infrastructure. Cybersecurity researchers at Dragos on Tuesday dubbed the new malware "FrostyGoop."
The interconnectedness of medical devices, which generate data that can be distributed to multiple systems that are often managed by different policies, presents privacy concerns that device manufacturers must address, said Adam Hesse, CEO of Full Spectrum.
In today's complex operational technology (OT) environments, specialized OT-native network visibility and security monitoring solutions are crucial. This whitepaper is an essential resource for understanding how the Dragos Platform provides the most comprehensive OT-native network visibility and security monitoring...
A new artificial intelligence-based protection system developed by the German government-funded SecDER project is revolutionizing the security of virtual power plants by detecting cyberattacks and predicting failures, according to Fraunhofer SIT Institute Darmstadt.
The deployment of an asset management platform is helping Main Line Health gain deeper visibility and better security over the 100,000-plus medical devices and IoT gear used throughout the group's multiple hospitals and medical facilities, said CISO Aaron Weismann, who discusses the implementation.
Fortinet is out with its latest State of Operational Technology and Cybersecurity report. The good news: More organizations are paying attention to OT: The bad: Not enough are securing it properly. Fortinet's Richard Springer analyzes the research findings.
Multiple critical vulnerabilities in Emerson Rosemount 370XA gas chromatographs could allow malicious actors to access sensitive data, cause denial-of-service conditions and execute arbitrary commands. Emerson recommends that end users update the firmware on the products.
Cisco remained atop Forrester's OT security rankings, Palo Alto Networks climbed into the leader space, and Claroty and Tenable fell to strong performer. The transition from a network-centric to an asset- and data-centric security model has introduced challenges, especially with legacy equipment.
Download the report to find out more about how Gartner® defines the SSE space and to see what Gartner® has to say about the other recognized SSE vendors.
As IT and security teams struggle to deliver consistent security across a hybrid environment, we believe FortiSASE will solve this challenge and will:
Secure...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.