X

Ultra Electronics 3eTi

0

Enhancing ICS Security Solutions Keeps Your Plant Operational

August 25th, 2017 / By

Enhance ICS Security Solutions to Keep Your Plant Operational

What happens when the systems responsible for powering the electric grid and utilities, water treatment plants, oil and gas production and every other industrial system that keeps our society moving forward go down? It can be catastrophic.

Companies increase the risk


Categories: Industrial Control Systems / Tags: , , , , ,

The Importance of 3rd Party Validation for Cyber Solutions

April 24th, 2017 / By

Why are 3rd party validations important for cyber solutions?

When I joined 3eTI a year ago, I recall often hearing about “Federal Information Processing Standards (FIPS)” and “Common Criteria (CC),” and their importance to cybersecurity from my peers. But at the time I had never heard of these and


Categories: Certifications and Validation / Tags: , , , , ,

RSA 2017 Recap of the ICS Sandbox

February 21st, 2017 / By

The 2017 RSA Conference wrapped up this week in San Francisco and wow, what a show! The sheer size and scale of the event was absolutely jaw dropping. It’s hard to find the words to do it justice. Organizers estimated that 40,000-50,000 people attended the show and considering the size, RSA does a great job with the organization of the event and providing an impressive experience overall.


Categories: Events, Industrial Control Systems / Tags: , , , , , ,

Cybersecurity for a New Type of Critical Infrastructure

February 1st, 2017 / By

Regulators Weigh in on Medical Devices

While the medical device as a cyber-attack target has increasingly concerned health regulators in recent years, the risk may come as news to many in traditional ICS infrastructure circles. For cybersecurity specialists focused on control


Categories: Critical Infrastructure, Cyber Security, Healthcare / Tags: , ,

Ukraine’s Power-Grid Failure Confirmed as Cyber-Attack. Now What?

March 18th, 2016 / By

Like many in the business of cybersecurity for industrial control systems (ICS), I’ve been closely following this winter’s cruel and expertly executed hack in Ukraine that left more than 200,000 people in the cold and dark two days before Christmas. The first confirmed cyber-attack to shut down a power grid, the Ukraine assault demonstrated that a motivated enemy can, and will, break through standard cyber-defenses to further an agenda in ways that are not soon forgotten.


Categories: Critical Infrastructure, Cyber Security / Tags:

Navy Admirals Seek Greater Accountability in Securing Critical Infrastructure

March 2nd, 2016 / By

Stating that weaknesses in industrial control system (ICS) security “will have serious consequences on our ability to execute assigned missions if not addressed,” the letter I recently received was addressed to Defense Secretary Ash Carter. In it, two Navy admirals asked the Secretary to require improved control-system security by adding it as a priority in the cyber scorecard.


Categories: Critical Infrastructure / Tags: , ,

DHS Offers Industry Seven Steps to Comprehensively Defend Control Systems: 3eTI Weighs In

February 26th, 2016 / By

Days before the New Year rang in, and less than a week after a cyber-attack cut electricity to tens of thousands of Ukrainians, the Department of Homeland Security released new guidance on tightening security in “as-built” industrial control systems (ICS). The recommendations, presented in “Seven Steps to Effectively Defend Industrial Control Systems,” are high-level but clearly support elevating the cybersecurity posture of ICS and critical network infrastructures.


Categories: Cyber Security, Industrial Control Systems / Tags: , , ,

Notes from the Road: DistribuTECH 2016

February 19th, 2016 / By

This year was my first visit to DistribuTECH and, with my background working with electric utilities, I wanted to focus on the “Defending the Grid” track. Topics of “Defending the Grid” addressed a variety of subjects including physical security, adopting the NIST Cybersecurity Frame Work, and application of threat assessment methodologies, to name a few.


Categories: Critical Infrastructure, Cyber Security, Events / Tags:

Ukrainian Power Grid Hacked, Lessons Learned

January 7th, 2016 / By

As reported in DataBreachToday and elsewhere in recent days, hackers gained remote access to power production systems in western Ukraine, taking multiple electrical substations offline late last month. The Computer Emergency Response Team of Ukraine (CERT-UA) confirmed that the December 23 blackout, which lasted three hours and darkened about 1.4 million homes, resulted from the BlackEnergy espionage Trojan and KillDisk wiper malware.


Categories: Industrial Control Systems / Tags: , , ,

In Light of the Recent Russian ICS Attack

October 2nd, 2015 / By

Most people understand that countries like Russia and China are capable of more sophisticated cyber-attacks. And others like Iran and North Korea may not be as sophisticated now, but certainly could be in the future. None of these countries are timid about displaying any differences they have with the US, or for that matter even exploiting our country’s political actions for their own gain.


Categories: Industrial Control Systems / Tags: