Industrial Cyber Security Solutions
Register Login
  • Channels
    • IT/OT Collaboration
    • Malware, Phishing & Ransomware
    • Transportation
    • Management & Strategy
    • Risk & Compliance
    • Supply Chain Security
    • Zero Trust for OT
  • Features
    • Features
    • Hall of Fame
      • Joe Marshall 
      • Sinclair Koelemij
      • Megan Samford
      • Joe Weiss
      • Eric Byres
      • Robert Lee
  • News
    • Vendors
    • Management & Strategy
    • Critical infrastructure
    • Attacks and Vulnerabilities
    • CISA
    • Regulation, Standards and Compliance
  • Vendor Directory
  • Resources
    • All Resources
    • Buyer’s Guide 2024
    • Handbooks
    • Guides & frameworks
  • Webinars & Events
    • Webinars
    • Industry Events
  • Team
    • Editors & SMEs
    • Industry Experts
    • Contribute
    • Contact Us

Tag: Organizational Resilience

Australian CISC enhances organizational resilience tools and framework, complements refreshed HealthCheck Tool
Australian CISC enhances organizational resilience tools and framework, complements refreshed HealthCheck Tool
The Australian Cyber and Infrastructure Security Centre (CISC) unveiled an enhanced self-assessment tool, the Organisational Resilience HealthCheck Tool, on Monday. The tool is designed based on modern organizational resilience methodologies to strengthen organizational resilience against various threats. Users can evaluate…

Features

Adopting strategic patch management tactics across ICS environments amid escalating cyber threats
Adopting strategic patch management tactics across ICS environments amid escalating cyber threats
Across the ICS (industrial control system) realm, ​​ensuring security and operational integrity is crucial for organizations in various sectors, amidst the increasing number of cybersecurity threats and attacks. In line with this, the strategies deployed for carrying out patch management…
OT Security Is Moving to the Endpoint – Where Humans Interact
OT Security Is Moving to the Endpoint – Where Humans Interact
When asked why he robbed banks, Depression-era bank robber Willie Sutton purportedly replied, “Because that’s where the money is.” If Sutton had been a modern-day cybercriminal, the corollary would be, “Why do you attack endpoints? Because that’s where humans interact.” In IT…
Enhancing national infrastructure security by harmonization of cybersecurity standards in OT/ICS environments
Enhancing national infrastructure security by harmonization of cybersecurity standards in OT/ICS environments
The global cybersecurity framework could significantly benefit from the harmonization of standards for OT (operational technology) and ICS (industrial control systems) cybersecurity across the organizational environment. The move will bring more control over the risks, with the possibility to enforce…
Intensifying focus on advancing product security in OT and ICS environments amid escalating cyber threats
Intensifying focus on advancing product security in OT and ICS environments amid escalating cyber threats
From a vendor's perspective, the rising cyber threats and attacks have put a sharp focus on the need for product security within OT and ICS environments. It puts vendors in a position with challenges related to how best to implement…
Increased focus to bolster cybersecurity stance across global energy supply chains, as attacks rise
Increased focus to bolster cybersecurity stance across global energy supply chains, as attacks rise
Recognizing the critical importance of securing the operational technologies (OT) that manage and operate essential energy systems, such as electricity, oil, and natural gas, G7 nations have decided to develop a collective cybersecurity framework focused on these technologies. On the…

News

MITRE, partners design Defending OT with ATT&CK, set to bolster security posture across critical installations
August 17, 2024
DoD proposes CMMC 2.0 rule to enhance cybersecurity in defense industrial base, seeks comment
August 16, 2024
DHS unveils CELR platform to improve maritime infrastructure cybersecurity from rising adversarial attacks
August 16, 2024
Dragos reports resurgence of ransomware attacks on industrial sectors, raising likelihood of targeting OT networks
August 16, 2024
Sepio’s total funding reaches $48 million with latest investment round
August 15, 2024
Keysight joins forces with JCDC to boost cybersecurity threat intelligence, research
August 15, 2024
White House report outlines policy recommendations for enhancing international cooperation in QIST
August 15, 2024
CISA reveals security flaws in critical infrastructure equipment from AVEVA, Ocean Data, Rockwell Automation
August 15, 2024
National Cyber Director Coker warns quantum computing threat ‘here now,’ calls for urgent action
August 15, 2024

Resources

Software Acquisition Guide for Government Enterprise Consumers (CISA)
CISA publishes Software Acquisition Guide to add software assurance in C-SCRM lifecycle
Download Download
National Counterintelligence Strategy 2024 (NCSC – USA)
NCSC debuts updated National Counterintelligence Strategy to bolster US security against evolving threats
Download Download
Zero Trust Outcomes Using ISA/IEC 62443 Standards
New ISAGCA whitepaper addresses zero trust outcomes using ISA/IEC 62443 standards
Download Download
Protecting Critical Supply Chains (ODNI & NCSC) – Risks from Foreign Adversarial Exposure
US security agencies focus on protecting critical supply chains from foreign adversarial exposure
Download Download
Singapore Cyber Landscape 2023 (CSA)
SCL 2023 report highlights supply chain vulnerabilities, rise of hacktivism, AI-enhanced cyber threats
Download Download
2024 State of Industrial Networking Report (Cisco)
Cisco survey report highlights cybersecurity as ‘top concern,’ identifies IT/OT collaboration, AI preparedness
Download Download
EU cybersecurity risk evaluation and scenarios for the telecommunications and electricity sectors (2024)
New EU risk assessment report assesses cybersecurity in Europe's telecommunications, electricity sectors
Download Download
Internet Organised Crime Threat Assessment (IOCTA) 2024
IOCTA 2024 report - Law enforcement deals major blows against EU cybercrime, disrupt ransomware networks
Download Download

Join the Industrial Cyber Community

Get the latest breaking OT/ICS news, access the resources and participate in our ICS Forum.
Register
  • Contact Us
  • Editorial
  • Advertising
  • Technology & Solutions
  • Industries
  • Vendors
  • News
  • Management & Strategy
Follow Us
Copyright © 2024 Industrial Cyber

All rights reserved | Terms and Conditions

Privacy Policy | Cookie Policy