ics


The Internet of Things (networks of uniquely identifiable endpoints, or "things," that communicate without human interaction using embedded IP connectivity) is the next industrial revolution. Estimates say there will be 24 Billion IoT devices installed by 2020, and $6 Trillion will be invested in IoT devices over the next 5 years. With that kind of growth and investment, protecting each of these “things” and their corresponding interactions with other components, including our networks, will be critical. So where is this... [Read More]
by RSS Daniel Cole  |  Sep 14, 2016  |  Filed in: Industry Trends & News
A couple of months ago I was discussing data center security with a panel of IT managers from critical infrastructure providers. One representative from a major energy provider said that he had no intention of segmenting his network. When I asked him how he monitors his network looking for attacks that have breached his perimeter, he told me, “That’s the FBI’s job.” I wish I could say this was unusual. Historically, the security strategy of many critical infrastructure companies was to simply not connect them to the... [Read More]
by RSS Daniel Cole  |  Jun 21, 2016  |  Filed in: Industry Trends & News
Everyone has heard how ransomware shut down the networks of several large healthcare providers this past year. To get their systems unlocked, these organizations paid huge ransoms to cybercriminals. Healthcare networks are notoriously vulnerable, and have been tagged by the media and security professionals as the preferred target for these sorts of attacks.That may be about to change. Fortinet research conducted over the past several months shows that manufacturing is likely to be the next industry specifically targeted by ransomware. In our latest... [Read More]
by RSS Bill McGee  |  Jun 06, 2016  |  Filed in: Industry Trends & News
Organizations of all types today face an evolving threatscape and growing pressure to rethink security strategies for long-term sustainability. Critical infrastructure industries, and the communities and economies they serve, face not only particularly damaging outcomes from successful cybersecurity attacks, but also need to deal with significant complexity due to the scale of their operations. Fortinet’s Daniel Cole discusses the issues and trends affecting the critical infrastructure organizations today. Q&A with Daniel Cole What’s... [Read More]
by RSS John Welton  |  May 16, 2016  |  Filed in: Industry Trends & News
While attackers are showing greater interest in both direct and indirect targeted attacks at Industrial Control Systems, it is perhaps a good time to assess where we stand with regards to protecting these systems.  Industrial Control Systems (ICS) are systems that control and monitor physical processes like the "transmission of electricity, transportation of gas and oil in pipelines, water distribution, traffic lights, and other systems used as the basis of modern society.” In recent years, the Industrial Control Systems... [Read More]
by RSS Ruchna Nigam  |  Apr 05, 2016  |  Filed in: Security Research
After having spent the past few months trying to get myself acquainted with the world of SCADA, it was time to look into the history of attacks it has been subject to. For the uninitiated, SCADA (Supervisory Control And Data Acquisition) is the term used for systems that are used to control physical equipment - such as in industries like power plants, oil and gas pipelines; at public facilities like metal detectors at airports; and even in private facilities e.g. to control/monitor processes like heating, ventilation, energy consumption etc. The... [Read More]
by RSS Ruchna Nigam  |  Feb 12, 2015  |  Filed in: Security Research
Following a post by F-Secure this June, bringing to light a variant of the Havex malware family targetting ICS/SCADA systems, there has been much speculation regarding the motives behind this malware campaign. That makes it only the second known malware family directly targeting SCADA equipment, after the infamous Stuxnet that reportedly set back Iran's nuclear program by 2 years. Symantec has called the attackers DragonFly while Crowdstrike refers to them as Energetic Bear in their 2013 Threat Report. Overall, there are two components of the... [Read More]
by RSS Ruchna Nigam  |  Jul 15, 2014  |  Filed in: Security Research