X

Ultra Electronics 3eTi

OT Security

Schlemiel! Schlimazel! Shamoon! – They’re gonna keep doing it.

January 29th, 2019 / By

Shamoon is back…and once again it’s targeting energy sector organizations primarily operating in the Middle East. This highly destructive computer virus was first unleashed in 2012, its main target primarily the state-owned oil company Saudi Aramco. Unlike ransomware, which holds data


Categories: Cyber Security, OT Security, Uncategorized / Tags:

When a Ransomware Attack Took over Cameras in DC, Where Was the Last Line of Defense?

July 17th, 2018 / By

Video surveillance cameras used every day to survey the streets of Washington DC and keep the people safe – hacked! We are familiar with data hacks, but this incident received noteworthy press coverage because it was one of the first


Categories: OT Security / Tags: , , , , ,

Playing Zone Defense in Operational Technology

July 12th, 2017 / By

SCADA Security, Image of Dam, Text: Operational Technology: Playing Zone Defense

Industry is increasingly connecting operational technology (OT) networks to the internet, widening the attack surface, and heightening risk. By the year 2020, nearly 40 billion devices will be connected to the internet. More exposure requires more protection.


Categories: OT Security / Tags: , , , , , , , ,

OT Security Keeps Industrial Plants Safe from Cyber Threats

July 11th, 2017 / By

Image of conveyor belt with robotic arms under text(OT Security Keeps Industrial Plants Safe from Cyber Threats)

One of an industrial company’s top priorities will always be to protect its assets from threats. Industry news reports stories about cyber attacks daily. While the news tends to focus on IT system attacks, they are not the only systems at risk. As operational technology (OT) systems become more complex, they become more vulnerable. What can companies do to increase OT security?


Categories: OT Security / Tags: , , , , , , , , , , , , , ,