a USB drive

A Major Industrial Cybersecurity Threat: Living off the Land Attacks

In “Living off the Land attacks,” adversaries use USB devices to infiltrate industrial control systems. Cyberthreats from silent residency attacks put critical infrastructure facilities at risk ...
Security Boulevard
cloud file service

AI Helps Security Teams, But Boosts Threats 

Industrial control systems, application containers, and mobile devices are the top contenders on this year's list of the most difficult assets to secure ...
Security Boulevard
SynSaber Security Challenges for ICS, OT

SynSaber Report Brings More Context to ICS Security

An analysis of three years of vulnerabilities found in industrial control systems (ICS) published by SynSaber, a provider of an ICS monitoring platform, found that while there may be no patches available, ...
Security Boulevard
Russia ‘Plans’ HUGE Cyberattack on Critical Infrastructure

Russia ‘Plans’ HUGE Cyberattack on Critical Infrastructure

The Ukrainian government has warned that Russia is planning a massive attack against the critical infrastructure of Ukraine and of its allies ...
Security Boulevard
Considerations for merging your IT and OT environments into ICS

Considerations for merging your IT and OT environments into ICS

Many organizations straddle the barrier between two different worlds: the Operational Technology (OT) world of physical machinery, manufacturing systems, SCADA, […] ...

What Is the Role of Incident Response in ICS Security?

In recent years, cyber espionage has been growing in magnitude and complexity. One of the most common targets is Industrial Control Systems (ICS) within critical infrastructure sectors. With many organizations relying more ...

Contextualizing the Ransomware Threat Confronting OT Environments

Back in early June, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) published a fact sheet discussing the rising threat of ransomware to operational technology (OT) assets. This development raises several questions ...

Application Security Check Up