X

Ultra Electronics 3eTi

Blog

OT Security Keeps Industrial Plants Safe from Cyber Threats

July 11th, 2017 / By

Image of conveyor belt with robotic arms under text(OT Security Keeps Industrial Plants Safe from Cyber Threats)

One of an industrial company’s top priorities will always be to protect its assets from threats. Industry news reports stories about cyber attacks daily. While the news tends to focus on IT system attacks, they are not the only systems at risk. As operational technology (OT) systems become more complex, they become more vulnerable. What can companies do to increase OT security?


Categories: OT Security / Tags: , , , , , , , , , , , , , ,

Playing Zone Defense in Operational Technology

July 11th, 2017 / By

Industry is increasingly connecting operational technology (OT) networks to the internet, widening the attack surface, and heightening risk. By the year 2020, nearly 40 billion devices will be connected to the internet. More exposure requires more protection.


Categories: OT Security / Tags: , , , , , ,

Cyber Shield 17: A Training Exercise in Cybersecurity Excellence and Collaboration

June 6th, 2017 / By

Cyber Shield 17 Seal with text (Cyber Shield 17: Cybersecurity Excellence and Collaboration)

3eTI was one of several vendors supporting ISA at Cyber Shield, providing resources and equipment for the cybersecurity courses. Qualified instructors for this year’s program were, as in the past, selected from top and highly trusted organizations including AE Solutions, Kenexis, Red Trident — and now 3eTI.


Categories: Events / Tags: , , , ,

Cybersecurity Questions Answered:
What Is an Industrial Firewall?

May 31st, 2017 / By

Text: Cybersecurity questions answered: What is an Industrial Firewall? over blue abstract industrial landscape

An industrial firewall is a network firewall that has been hardened for use in industrial environments such as power plants, utility facilities, refineries, and the like. These hardware firewalls are purpose-built to work alongside SCADA (supervisory control and data acquisition) equipment in sometimes harsh surroundings.


Categories: Certifications and Validation, Industrial Control Systems / Tags: , , , , ,

The Importance of 3rd Party Validation for Cyber Solutions

April 24th, 2017 / By

Why are 3rd party validations important for cyber solutions?

When I joined 3eTI a year ago, I recall often hearing about “Federal Information Processing Standards (FIPS)” and “Common Criteria (CC),” and their importance to cybersecurity from my peers. But at the time I had never heard of these and


Categories: Certifications and Validation / Tags: , , , , ,

Simulation Reveals Ransomware
Threat to ICS

March 7th, 2017 / By

(Authors Matt Cowell & Sunny DeMattio)

As many have heard, ransomware is one of the latest forms of malware plaguing the internet today. With typical ransomware a user’s system is held hostage until the user agrees to pay the proposed


Categories: Cyber Security, Industrial Control Systems / Tags:

RSA 2017 Recap of the ICS Sandbox

February 21st, 2017 / By

The 2017 RSA Conference wrapped up this week in San Francisco and wow, what a show! The sheer size and scale of the event was absolutely jaw dropping. It’s hard to find the words to do it justice. Organizers estimated that 40,000-50,000 people attended the show and considering the size, RSA does a great job with the organization of the event and providing an impressive experience overall.


Categories: Events, Industrial Control Systems / Tags: , , , , , ,

Cybersecurity for a New Type of Critical Infrastructure

February 1st, 2017 / By

Regulators Weigh in on Medical Devices

While the medical device as a cyber-attack target has increasingly concerned health regulators in recent years, the risk may come as news to many in traditional ICS infrastructure circles. For cybersecurity specialists focused on control


Categories: Critical Infrastructure, Cyber Security, Healthcare / Tags: , ,

Cybersecurity Spotlight: Next Generation Firewalls within the ICS Network

September 26th, 2016 / By

A next-generation firewall (NGFW) enforces security policy on multiple layers of the OSI model. In addition to a traditional network layer firewall, an NGFW is able to filter at the application layer as well.


Categories: Industrial Control Systems / Tags: , ,

Defending ICS: How Are We Doing?

August 11th, 2016 / By

Seven months have passed since the Department of Homeland Security issued Seven Strategies to Defend ICSs and the time seems ripe to consider the state of control system cybersecurity.


Categories: Industrial Control Systems / Tags: , , , , ,