Application Whitelisting: Friend or Foe
The Department of Homeland Security (DHS) recently released guidance listing tactics to reliably protect ICS. The DHS paper, Seven Steps to Effectively Defend Industrial Control Systems, highlights the increasing frequency of successful intrusions into US critical infrastructure systems. It also provides cost-effective strategies that, if followed, will raise the security posture of the entire industry. View our four-part webinar series, where we discussed solutions for implementing the recommended actions to ensure a secure baseline on which to build efficient and resilient control systems.
Part 1 of 4: Whitelisting methods are effective and add powerful protection where firewalls cannot. A 3eTI expert discusses proactive malware detection and hacking prevention through AWL defenses that leave operations fully intact.