Industrial Cyber Security Solutions
Register Login
  • Channels
    • IT/OT Collaboration
    • Malware, Phishing & Ransomware
    • Transportation
    • Management & Strategy
    • Risk & Compliance
    • Supply Chain Security
    • Zero Trust for OT
  • Features
    • Features
    • Hall of Fame
      • Joe Marshall 
      • Sinclair Koelemij
      • Megan Samford
      • Joe Weiss
      • Eric Byres
      • Robert Lee
  • News
    • Vendors
    • Management & Strategy
    • Critical infrastructure
    • Attacks and Vulnerabilities
    • CISA
    • Regulation, Standards and Compliance
  • Vendor Directory
  • Resources
    • All Resources
    • Buyer’s Guide 2024
    • Handbooks
    • Guides & frameworks
  • Webinars & Events
    • Webinars
    • Industry Events
  • Team
    • Editors & SMEs
    • Industry Experts
    • Contribute
    • Contact Us

Tag: Oldsmar

Oldsmar water treatment plant incident allegedly caused by human error, not remote access cybersecurity breach
Oldsmar water treatment plant incident allegedly caused by human error, not remote access cybersecurity breach
An official at the Oldsmar water treatment facility, outside Tampa, Florida, announced last month that the 2021 remote access cybersecurity breach was not a hack at all. The incident has now been described as a case of an employee inadvertently…
security directives
House Homeland Committee scrutinizes cyber security directives on transportation sector
The Committee on Homeland Security met on Tuesday at a joint subcommittee meeting to consider industry-wide cyber security directives for the transportation sector. Representatives cautioned that as the Department of Homeland Security (DHS) embarks upon this new approach, it must…
cyber security training
Industrial cyber security training comes into focus in advancing threat landscape – Part II
Increased focus and demand for OT cybersecurity are driving the need for continued and even greater cyber security training and talent. ICS engineers and system operators must be periodically taught to identify vulnerabilities in ICS environments, determine how attackers can…
Oldsmar water plant hack
Government agencies analyze Oldsmar water plant hack
U.S. security agencies revealed that preliminary information from the Oldsmar water plant hack suggests that the unidentified cyber actors likely accessed the water treatment system by exploiting cybersecurity weaknesses, including poor password security, and an outdated operating system. The hackers…

Features

Adopting strategic patch management tactics across ICS environments amid escalating cyber threats
Adopting strategic patch management tactics across ICS environments amid escalating cyber threats
Across the ICS (industrial control system) realm, ​​ensuring security and operational integrity is crucial for organizations in various sectors, amidst the increasing number of cybersecurity threats and attacks. In line with this, the strategies deployed for carrying out patch management…
OT Security Is Moving to the Endpoint – Where Humans Interact
OT Security Is Moving to the Endpoint – Where Humans Interact
When asked why he robbed banks, Depression-era bank robber Willie Sutton purportedly replied, “Because that’s where the money is.” If Sutton had been a modern-day cybercriminal, the corollary would be, “Why do you attack endpoints? Because that’s where humans interact.” In IT…
Enhancing national infrastructure security by harmonization of cybersecurity standards in OT/ICS environments
Enhancing national infrastructure security by harmonization of cybersecurity standards in OT/ICS environments
The global cybersecurity framework could significantly benefit from the harmonization of standards for OT (operational technology) and ICS (industrial control systems) cybersecurity across the organizational environment. The move will bring more control over the risks, with the possibility to enforce…
Intensifying focus on advancing product security in OT and ICS environments amid escalating cyber threats
Intensifying focus on advancing product security in OT and ICS environments amid escalating cyber threats
From a vendor's perspective, the rising cyber threats and attacks have put a sharp focus on the need for product security within OT and ICS environments. It puts vendors in a position with challenges related to how best to implement…
Increased focus to bolster cybersecurity stance across global energy supply chains, as attacks rise
Increased focus to bolster cybersecurity stance across global energy supply chains, as attacks rise
Recognizing the critical importance of securing the operational technologies (OT) that manage and operate essential energy systems, such as electricity, oil, and natural gas, G7 nations have decided to develop a collective cybersecurity framework focused on these technologies. On the…

News

DoD proposes CMMC 2.0 rule to enhance cybersecurity in defense industrial base, seeks comment
August 16, 2024
DHS unveils CELR platform to improve maritime infrastructure cybersecurity from rising adversarial attacks
August 16, 2024
Dragos reports resurgence of ransomware attacks on industrial sectors, raising likelihood of targeting OT networks
August 16, 2024
Sepio’s total funding reaches $48 million with latest investment round
August 15, 2024
Keysight joins forces with JCDC to boost cybersecurity threat intelligence, research
August 15, 2024
White House report outlines policy recommendations for enhancing international cooperation in QIST
August 15, 2024
CISA reveals security flaws in critical infrastructure equipment from AVEVA, Ocean Data, Rockwell Automation
August 15, 2024
National Cyber Director Coker warns quantum computing threat ‘here now,’ calls for urgent action
August 15, 2024
NIST approves three quantum-resistant encryption standards, bolsters cybersecurity posture
August 14, 2024

Resources

Software Acquisition Guide for Government Enterprise Consumers (CISA)
CISA publishes Software Acquisition Guide to add software assurance in C-SCRM lifecycle
Download Download
National Counterintelligence Strategy 2024 (NCSC – USA)
NCSC debuts updated National Counterintelligence Strategy to bolster US security against evolving threats
Download Download
Zero Trust Outcomes Using ISA/IEC 62443 Standards
New ISAGCA whitepaper addresses zero trust outcomes using ISA/IEC 62443 standards
Download Download
Protecting Critical Supply Chains (ODNI & NCSC) – Risks from Foreign Adversarial Exposure
US security agencies focus on protecting critical supply chains from foreign adversarial exposure
Download Download
Singapore Cyber Landscape 2023 (CSA)
SCL 2023 report highlights supply chain vulnerabilities, rise of hacktivism, AI-enhanced cyber threats
Download Download
2024 State of Industrial Networking Report (Cisco)
Cisco survey report highlights cybersecurity as ‘top concern,’ identifies IT/OT collaboration, AI preparedness
Download Download
EU cybersecurity risk evaluation and scenarios for the telecommunications and electricity sectors (2024)
New EU risk assessment report assesses cybersecurity in Europe's telecommunications, electricity sectors
Download Download
Internet Organised Crime Threat Assessment (IOCTA) 2024
IOCTA 2024 report - Law enforcement deals major blows against EU cybercrime, disrupt ransomware networks
Download Download

Join the Industrial Cyber Community

Get the latest breaking OT/ICS news, access the resources and participate in our ICS Forum.
Register
  • Contact Us
  • Editorial
  • Advertising
  • Technology & Solutions
  • Industries
  • Vendors
  • News
  • Management & Strategy
Follow Us
Copyright © 2024 Industrial Cyber

All rights reserved | Terms and Conditions

Privacy Policy | Cookie Policy