Industrial Cyber Security Solutions
Register Login
  • Channels
    • IT/OT Collaboration
    • Malware, Phishing & Ransomware
    • Transportation
    • Management & Strategy
    • Risk & Compliance
    • Supply Chain Security
    • Zero Trust for OT
  • Features
    • Features
    • Hall of Fame
      • Joe Marshall 
      • Sinclair Koelemij
      • Megan Samford
      • Joe Weiss
      • Eric Byres
      • Robert Lee
  • News
    • Vendors
    • Management & Strategy
    • Critical infrastructure
    • Attacks and Vulnerabilities
    • CISA
    • Regulation, Standards and Compliance
  • Vendor Directory
  • Resources
    • All Resources
    • Buyer’s Guide 2024
    • Handbooks
    • Guides & frameworks
  • Webinars & Events
    • Webinars
    • Industry Events
  • Team
    • Editors & SMEs
    • Industry Experts
    • Contribute
    • Contact Us

Tag: simulation

Galina Antova appointed to Cloud Range board, with a focus on bridging skills gap, boosting cyber defenses
Cloud Range launches initial cyber incident Commander Training to improve response time, elevate performance
Cloud Range announced Tuesday the launch of its new training program, Cybersecurity Incident Commander Training. Offered for a limited time at no cost, the training is tailored to those managing incidents in the security operations center (SOC). Previously existing tools…
EU, ENISA, member states join forces on Blue OLEx '23 tabletop exercises to boost cybersecurity preparedness
EU, ENISA, member states join forces on Blue OLEx ’23 tabletop exercises to boost cybersecurity preparedness
The European Commission, in collaboration with member states, stages an extensive cyberattack simulation to bolster readiness and preparedness. Senior cybersecurity representatives from EU member states, the Commission, and the EU Agency for Cybersecurity (ENISA) are taking part in a two-day…
cyber ranges
Accenture Beefs up Industrial Cybersecurity Capabilities with Network of “Cyber Ranges”
The Accenture “Cyber Ranges” will enable Industrial Companies Simulate and Respond to Cyberattacks, including those in the oil and gas, chemicals, utilities and manufacturing industries — practice their response to cyberattacks across their most critical assets. The cyber ranges are…

Features

Adopting strategic patch management tactics across ICS environments amid escalating cyber threats
Adopting strategic patch management tactics across ICS environments amid escalating cyber threats
Across the ICS (industrial control system) realm, ​​ensuring security and operational integrity is crucial for organizations in various sectors, amidst the increasing number of cybersecurity threats and attacks. In line with this, the strategies deployed for carrying out patch management…
OT Security Is Moving to the Endpoint – Where Humans Interact
OT Security Is Moving to the Endpoint – Where Humans Interact
When asked why he robbed banks, Depression-era bank robber Willie Sutton purportedly replied, “Because that’s where the money is.” If Sutton had been a modern-day cybercriminal, the corollary would be, “Why do you attack endpoints? Because that’s where humans interact.” In IT…
Enhancing national infrastructure security by harmonization of cybersecurity standards in OT/ICS environments
Enhancing national infrastructure security by harmonization of cybersecurity standards in OT/ICS environments
The global cybersecurity framework could significantly benefit from the harmonization of standards for OT (operational technology) and ICS (industrial control systems) cybersecurity across the organizational environment. The move will bring more control over the risks, with the possibility to enforce…
Intensifying focus on advancing product security in OT and ICS environments amid escalating cyber threats
Intensifying focus on advancing product security in OT and ICS environments amid escalating cyber threats
From a vendor's perspective, the rising cyber threats and attacks have put a sharp focus on the need for product security within OT and ICS environments. It puts vendors in a position with challenges related to how best to implement…
Increased focus to bolster cybersecurity stance across global energy supply chains, as attacks rise
Increased focus to bolster cybersecurity stance across global energy supply chains, as attacks rise
Recognizing the critical importance of securing the operational technologies (OT) that manage and operate essential energy systems, such as electricity, oil, and natural gas, G7 nations have decided to develop a collective cybersecurity framework focused on these technologies. On the…

News

MITRE, partners design Defending OT with ATT&CK, set to bolster security posture across critical installations
August 17, 2024
DoD proposes CMMC 2.0 rule to enhance cybersecurity in defense industrial base, seeks comment
August 16, 2024
DHS unveils CELR platform to improve maritime infrastructure cybersecurity from rising adversarial attacks
August 16, 2024
Dragos reports resurgence of ransomware attacks on industrial sectors, raising likelihood of targeting OT networks
August 16, 2024
Sepio’s total funding reaches $48 million with latest investment round
August 15, 2024
Keysight joins forces with JCDC to boost cybersecurity threat intelligence, research
August 15, 2024
White House report outlines policy recommendations for enhancing international cooperation in QIST
August 15, 2024
CISA reveals security flaws in critical infrastructure equipment from AVEVA, Ocean Data, Rockwell Automation
August 15, 2024
National Cyber Director Coker warns quantum computing threat ‘here now,’ calls for urgent action
August 15, 2024

Resources

Software Acquisition Guide for Government Enterprise Consumers (CISA)
CISA publishes Software Acquisition Guide to add software assurance in C-SCRM lifecycle
Download Download
National Counterintelligence Strategy 2024 (NCSC – USA)
NCSC debuts updated National Counterintelligence Strategy to bolster US security against evolving threats
Download Download
Zero Trust Outcomes Using ISA/IEC 62443 Standards
New ISAGCA whitepaper addresses zero trust outcomes using ISA/IEC 62443 standards
Download Download
Protecting Critical Supply Chains (ODNI & NCSC) – Risks from Foreign Adversarial Exposure
US security agencies focus on protecting critical supply chains from foreign adversarial exposure
Download Download
Singapore Cyber Landscape 2023 (CSA)
SCL 2023 report highlights supply chain vulnerabilities, rise of hacktivism, AI-enhanced cyber threats
Download Download
2024 State of Industrial Networking Report (Cisco)
Cisco survey report highlights cybersecurity as ‘top concern,’ identifies IT/OT collaboration, AI preparedness
Download Download
EU cybersecurity risk evaluation and scenarios for the telecommunications and electricity sectors (2024)
New EU risk assessment report assesses cybersecurity in Europe's telecommunications, electricity sectors
Download Download
Internet Organised Crime Threat Assessment (IOCTA) 2024
IOCTA 2024 report - Law enforcement deals major blows against EU cybercrime, disrupt ransomware networks
Download Download

Join the Industrial Cyber Community

Get the latest breaking OT/ICS news, access the resources and participate in our ICS Forum.
Register
  • Contact Us
  • Editorial
  • Advertising
  • Technology & Solutions
  • Industries
  • Vendors
  • News
  • Management & Strategy
Follow Us
Copyright © 2024 Industrial Cyber

All rights reserved | Terms and Conditions

Privacy Policy | Cookie Policy