Industrial Cyber Security Solutions
Register Login
  • Channels
    • IT/OT Collaboration
    • Malware, Phishing & Ransomware
    • Transportation
    • Management & Strategy
    • Risk & Compliance
    • Supply Chain Security
    • Zero Trust for OT
  • Features
    • Features
    • Hall of Fame
      • Joe Marshall 
      • Sinclair Koelemij
      • Megan Samford
      • Joe Weiss
      • Eric Byres
      • Robert Lee
  • News
    • Vendors
    • Management & Strategy
    • Critical infrastructure
    • Attacks and Vulnerabilities
    • CISA
    • Regulation, Standards and Compliance
  • Vendor Directory
  • Resources
    • All Resources
    • Buyer’s Guide 2024
    • Handbooks
    • Guides & frameworks
  • Webinars & Events
    • Webinars
    • Industry Events
  • Team
    • Editors & SMEs
    • Industry Experts
    • Contribute
    • Contact Us

Tag: defense contractor

Chinese hacker group TA423 targets Australian governmental entities, countries in South China Sea
Chinese hacker group TA423 targets Australian governmental entities, countries in South China Sea
Researchers at Proofpoint and PwC Threat Intelligence provided details of TA423/Red Ladon, a China-based, espionage-motivated hacker campaign with an international reach. The group maintains a heavy focus on the Asia Pacific region, Australian governmental entities, and companies and countries operating…
Russian cyber hackers gain access to unclassified American cleared defense contractor data
Russian cyber hackers gain access to unclassified American cleared defense contractor data
U.S. security agencies identified that Russian state-sponsored cyber hackers have targeted cleared defense contractor (CDCs) networks for over two years. These intrusions have led to adversaries obtaining access to sensitive American defense information and technology, potentially exposing program developments and…
Deploying CMMC 2.0 model to enhance defense industrial base cybersecurity against evolving threats
Deploying CMMC 2.0 model to enhance defense industrial base cybersecurity against evolving threats
The U.S. Department of Defense (DoD) released in November the CMMC 2.0 model, an upgrade of its earlier 1.0 framework, covers cyber protection standards across the defense industrial base (DIB) from evolving threats. The Cybersecurity Maturity Model Certification (CMMC) framework…

Features

Adopting strategic patch management tactics across ICS environments amid escalating cyber threats
Adopting strategic patch management tactics across ICS environments amid escalating cyber threats
Across the ICS (industrial control system) realm, ​​ensuring security and operational integrity is crucial for organizations in various sectors, amidst the increasing number of cybersecurity threats and attacks. In line with this, the strategies deployed for carrying out patch management…
OT Security Is Moving to the Endpoint – Where Humans Interact
OT Security Is Moving to the Endpoint – Where Humans Interact
When asked why he robbed banks, Depression-era bank robber Willie Sutton purportedly replied, “Because that’s where the money is.” If Sutton had been a modern-day cybercriminal, the corollary would be, “Why do you attack endpoints? Because that’s where humans interact.” In IT…
Enhancing national infrastructure security by harmonization of cybersecurity standards in OT/ICS environments
Enhancing national infrastructure security by harmonization of cybersecurity standards in OT/ICS environments
The global cybersecurity framework could significantly benefit from the harmonization of standards for OT (operational technology) and ICS (industrial control systems) cybersecurity across the organizational environment. The move will bring more control over the risks, with the possibility to enforce…
Intensifying focus on advancing product security in OT and ICS environments amid escalating cyber threats
Intensifying focus on advancing product security in OT and ICS environments amid escalating cyber threats
From a vendor's perspective, the rising cyber threats and attacks have put a sharp focus on the need for product security within OT and ICS environments. It puts vendors in a position with challenges related to how best to implement…
Increased focus to bolster cybersecurity stance across global energy supply chains, as attacks rise
Increased focus to bolster cybersecurity stance across global energy supply chains, as attacks rise
Recognizing the critical importance of securing the operational technologies (OT) that manage and operate essential energy systems, such as electricity, oil, and natural gas, G7 nations have decided to develop a collective cybersecurity framework focused on these technologies. On the…

News

DoD proposes CMMC 2.0 rule to enhance cybersecurity in defense industrial base, seeks comment
August 16, 2024
DHS unveils CELR platform to improve maritime infrastructure cybersecurity from rising adversarial attacks
August 16, 2024
Dragos reports resurgence of ransomware attacks on industrial sectors, raising likelihood of targeting OT networks
August 16, 2024
Sepio’s total funding reaches $48 million with latest investment round
August 15, 2024
Keysight joins forces with JCDC to boost cybersecurity threat intelligence, research
August 15, 2024
White House report outlines policy recommendations for enhancing international cooperation in QIST
August 15, 2024
CISA reveals security flaws in critical infrastructure equipment from AVEVA, Ocean Data, Rockwell Automation
August 15, 2024
National Cyber Director Coker warns quantum computing threat ‘here now,’ calls for urgent action
August 15, 2024
NIST approves three quantum-resistant encryption standards, bolsters cybersecurity posture
August 14, 2024

Resources

Software Acquisition Guide for Government Enterprise Consumers (CISA)
CISA publishes Software Acquisition Guide to add software assurance in C-SCRM lifecycle
Download Download
National Counterintelligence Strategy 2024 (NCSC – USA)
NCSC debuts updated National Counterintelligence Strategy to bolster US security against evolving threats
Download Download
Zero Trust Outcomes Using ISA/IEC 62443 Standards
New ISAGCA whitepaper addresses zero trust outcomes using ISA/IEC 62443 standards
Download Download
Protecting Critical Supply Chains (ODNI & NCSC) – Risks from Foreign Adversarial Exposure
US security agencies focus on protecting critical supply chains from foreign adversarial exposure
Download Download
Singapore Cyber Landscape 2023 (CSA)
SCL 2023 report highlights supply chain vulnerabilities, rise of hacktivism, AI-enhanced cyber threats
Download Download
2024 State of Industrial Networking Report (Cisco)
Cisco survey report highlights cybersecurity as ‘top concern,’ identifies IT/OT collaboration, AI preparedness
Download Download
EU cybersecurity risk evaluation and scenarios for the telecommunications and electricity sectors (2024)
New EU risk assessment report assesses cybersecurity in Europe's telecommunications, electricity sectors
Download Download
Internet Organised Crime Threat Assessment (IOCTA) 2024
IOCTA 2024 report - Law enforcement deals major blows against EU cybercrime, disrupt ransomware networks
Download Download

Join the Industrial Cyber Community

Get the latest breaking OT/ICS news, access the resources and participate in our ICS Forum.
Register
  • Contact Us
  • Editorial
  • Advertising
  • Technology & Solutions
  • Industries
  • Vendors
  • News
  • Management & Strategy
Follow Us
Copyright © 2024 Industrial Cyber

All rights reserved | Terms and Conditions

Privacy Policy | Cookie Policy