Remove state-of-security industrial-security-not-just-it-and-ot-but-old-ot-and-new-ot
article thumbnail

How Cyber Safe is Your Drinking Water Supply?

Krebs on Security

The Water Information Sharing and Analysis Center (WaterISAC) — an industry group that tries to facilitate information sharing and the adoption of best practices among utilities in the water sector — surveyed roughly 600 employees of water and wastewater treatment facilities nationwide, and found 37.9 percent working to do so.

Hacking 329
article thumbnail

The top 5 cybersecurity threats to OT security

IT Security Guru

What keeps OT security specialists up at night? Operational technology (OT) used to be the specialist networks nobody in IT bothered with, or perhaps thought they didn’t need to. For a while, that seemed reasonable; OT networks were usually isolated from IT operations, sat behind air gaps, and ran on obscure operating systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Industrial Security: Not Just IT and OT, but Old OT and New OT

Security Boulevard

Lane Thames, PhD and principal security researcher at Tripwire explains the challenges you might not have considered in IT/OT convergence. I am joined by Lane Thames, principal security researcher at […]… Read More. I am joined by Lane Thames, principal security researcher at […]… Read More.

article thumbnail

Q&A: Why emerging IoT platforms require the same leading-edge security as industrial controls

The Last Watchdog

In 2019, and moving ahead, look for legacy IT business networks to increasingly intersect with a new class of networks dedicated to controlling the operations of a IoT-enabled services of all types, including smart buildings, IoT-enabled healthcare services and driverless cars. Related: Why the golden age of cyber espionage is upon us.

IoT 174
article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

She’s an amazing person who has done an amazing number of things in a short amount of time -- CMU professor, Forrester analyst, CSO at a successful startup -- and she’s not done changing the industry. And I was really fortunate to land the security beat right away. What if you are a woman in information security?

InfoSec 40
article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

After receiving input from industry experts and doing my own analysis of the year’s driving forces, I identified five major cybersecurity trends. Attack surfaces will explode: Cyberdefense complexity will compound as API, cloud, edge, and OT resources add to the list of assets to defend. Bottom line: Prepare now based on risk.

article thumbnail

The Hacker Mind Podcast: Fuzzing Message Brokers

ForAllSecure

As I produce this episode, there's a dangerous new vulnerability known informally as Log4Shell, it’s a flaw in an open source Java logging library developed by the Apache Foundation and, in the hands of a malicious actor, could allow for remote code injection. The trouble is, details of this leaked prematurely.