X

Ultra Electronics 3eTi

Cyber Security

Physical Cybersecurity Comes of Age

May 30th, 2018 / By

The IT security industry was originally developed a few decades ago to secure enterprise IT systems and this has remained its mission for many up until today. This concept assumed that enterprise networks had perimeters and the best way to


Categories: Cyber Security / Tags: , , ,

Ransomware, Atlanta Edition: Another Month, Another Preventable Attack

March 30th, 2018 / By

Oh, Atlanta. Home of perhaps the world’s busiest airport, top educational institutions and a growing film industry that, by some accounts, rivals Hollywood, is the latest victim of data thieves in a March 22 ransomware attack. The ninth largest metro


Categories: Cyber Security / Tags: , , , ,

Cybersecurity Spotlight: Next Generation Firewalls within the ICS Network

September 26th, 2016 / By

A next-generation firewall (NGFW) enforces security policy on multiple layers of the OSI model. In addition to a traditional network layer firewall, an NGFW is able to filter at the application layer as well.


Categories: Industrial Control Systems / Tags: , ,

Defending ICS: How Are We Doing?

August 11th, 2016 / By

Seven months have passed since the Department of Homeland Security issued Seven Strategies to Defend ICSs and the time seems ripe to consider the state of control system cybersecurity.


Categories: Industrial Control Systems / Tags: , , , , ,

How to Secure Industrial Control Systems for High Reliability and Robust Performance

September 15th, 2015 / By

I am always pleased to share operationally sound methods for deeply layering security, and I frequently demonstrate live hacks that illustrate how exploits can be countered undetectably to hackers once they’ve breached the firewall — as they inevitably will.


Categories: Industrial Control Systems / Tags: , , , , , , ,

Collaborating to Strengthen Industrial Automation Security

February 18th, 2015 / By

The world’s unwavering standard bearers of cyber-secure critical infrastructure lead by example and impact. Facilities under the US Department of Defense remain focused on, and committed to, standards-based best security practices. With an equal devotion to standards that assure and secure critical networks, 3eTI has proudly provided cybersecurity systems and devices to DoD for more than 20 years.


Categories: Announcements, Cyber Security, Events, Industrial Control Systems / Tags: , ,

The High Cost of Playing Down ICS Cybersecurity

June 20th, 2014 / By

When Reuters reported May 20 that an unnamed American utility’s control system was hacked, according to the Department of Homeland Security, the story and DHS pointed out that despite no apparent operational impact, the utility probably had been hacked before. The agency’s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) said, according to Reuters, that employees probably let the hackers in through an Internet portal that used a password system vulnerable to brute force hacks.


Categories: Critical Infrastructure, Cyber Security, Industrial Control Systems / Tags: , , , , ,