X

Ultra Electronics 3eTi

Blog

Ransomware, Atlanta Edition: Another Month, Another Preventable Attack

March 30th, 2018 / By

A Boeing 787-10 aircraft being built at Boeing South Carolina in North Charleston © Randall Hill / Reuters

Oh, Atlanta. Home of perhaps the world’s busiest airport, top educational institutions and a growing film industry that, by some accounts, rivals Hollywood, is the latest victim of data thieves in a March 22 ransomware attack. The ninth largest metro area in the nation, with a population exceeding 5.7 million, was effectively knocked off line when municipal computers were idled at City Hall and beyond. Financial and personal data was encrypting pending receipt of a per-computer payment of $6,800, or $51,000 for system-wide restoration. WiFi at Hartsfield-Jackson Atlanta International Airport was disabled as a precaution.


Categories: Cyber Security / Tags: , ,

The Triton/Hatman Malware: Safety Systems Rendered Unsafe

December 21st, 2017 / By

Power Plant Smoke Stacks

An alarming new cyber threat set the industrial control industry abuzz this month with the discovery of the Triton (or Trisis/Hatman) Malware. Similar in some ways to the Stuxnet worm of seven years ago, this new threat startled industry-watchers for


Categories: Cyber Security, Industrial Control Systems / Tags: , , , , , ,

Enhancing ICS Security Solutions Keeps Your Plant Operational

August 25th, 2017 / By

Enhance ICS Security Solutions to Keep Your Plant Operational

What happens when the systems responsible for powering the electric grid and utilities, water treatment plants, oil and gas production and every other industrial system that keeps our society moving forward go down? It can be catastrophic.

Companies increase the risk


Categories: Industrial Control Systems / Tags: , , , , ,

Playing Zone Defense in Operational Technology

July 12th, 2017 / By

SCADA Security, Image of Dam, Text: Operational Technology: Playing Zone Defense

Industry is increasingly connecting operational technology (OT) networks to the internet, widening the attack surface, and heightening risk. By the year 2020, nearly 40 billion devices will be connected to the internet. More exposure requires more protection.


Categories: OT Security / Tags: , , , , , , , ,

OT Security Keeps Industrial Plants Safe from Cyber Threats

July 11th, 2017 / By

Image of conveyor belt with robotic arms under text(OT Security Keeps Industrial Plants Safe from Cyber Threats)

One of an industrial company’s top priorities will always be to protect its assets from threats. Industry news reports stories about cyber attacks daily. While the news tends to focus on IT system attacks, they are not the only systems at risk. As operational technology (OT) systems become more complex, they become more vulnerable. What can companies do to increase OT security?


Categories: OT Security / Tags: , , , , , , , , , , , , , ,

Cyber Shield 17: A Training Exercise in Cybersecurity Excellence and Collaboration

June 6th, 2017 / By

Cyber Shield 17 Seal with text (Cyber Shield 17: Cybersecurity Excellence and Collaboration)

3eTI was one of several vendors supporting ISA at Cyber Shield, providing resources and equipment for the cybersecurity courses. Qualified instructors for this year’s program were, as in the past, selected from top and highly trusted organizations including AE Solutions, Kenexis, Red Trident — and now 3eTI.


Categories: Events / Tags: , , , ,

Cybersecurity Questions Answered:
What Is an Industrial Firewall?

May 31st, 2017 / By

Text: Cybersecurity questions answered: What is an Industrial Firewall? over blue abstract industrial landscape

An industrial firewall is a network firewall that has been hardened for use in industrial environments such as power plants, utility facilities, refineries, and the like. These hardware firewalls are purpose-built to work alongside SCADA (supervisory control and data acquisition) equipment in sometimes harsh surroundings.


Categories: Certifications and Validation, Industrial Control Systems / Tags: , , , , ,

The Importance of 3rd Party Validation for Cyber Solutions

April 24th, 2017 / By

Why are 3rd party validations important for cyber solutions?

When I joined 3eTI a year ago, I recall often hearing about “Federal Information Processing Standards (FIPS)” and “Common Criteria (CC),” and their importance to cybersecurity from my peers. But at the time I had never heard of these and


Categories: Certifications and Validation / Tags: , , , , ,

Simulation Reveals Ransomware
Threat to ICS

March 7th, 2017 / By

(Authors Matt Cowell & Sunny DeMattio)

As many have heard, ransomware is one of the latest forms of malware plaguing the internet today. With typical ransomware a user’s system is held hostage until the user agrees to pay the proposed


Categories: Cyber Security, Industrial Control Systems / Tags:

RSA 2017 Recap of the ICS Sandbox

February 21st, 2017 / By

The 2017 RSA Conference wrapped up this week in San Francisco and wow, what a show! The sheer size and scale of the event was absolutely jaw dropping. It’s hard to find the words to do it justice. Organizers estimated that 40,000-50,000 people attended the show and considering the size, RSA does a great job with the organization of the event and providing an impressive experience overall.


Categories: Events, Industrial Control Systems / Tags: , , , , , ,