Securing operational technologies (OT) has become increasingly crucial in today’s interconnected world. I am excited to announce that Nozomi Networks and Cynalytica have joined forces to deliver a groundbreaking solution that extends visibility, situational awareness, and threat detection across operational technologies. This partnership now offers the unique capability to monitor both IP and non-IP based ICS/SCADA and OT communications.
We are very excited to be part of the collaboration with the QUB Cyber-AI Hub team and Industry Partners working to address many of the rapidly evolving threats and solutions to monitoring and securing OT & ICS systems and critical infrastructure.
The Environmental Protection Agency’s memorandum on “Addressing PWS Cybersecurity in Sanitary Surveys or an Alternate Process” is a “guide” for public water systems (PWS) to evaluate and improve their cybersecurity posture. The memorandum does provide some useful guidance and recommendations for PWS to identify, assess, and manage cybersecurity risks in their operations, including conducting vulnerability assessments, developing incident response plans, and implementing cybersecurity controls.
supervisory control and data acquisition (SCADA) systems have led to a surge in cyber threats targeting these critical infrastructure systems. The potential consequences of an attack on ICS/SCADA systems can be devastating, ranging from environmental disasters to large-scale disruptions in essential services. To address these risks, OTNetGuard has developed an innovative ICS/SCADA monitoring sensor that can passively and securely capture analog, serial, and IP ICS/SCADA communications.
eration of critical infrastructure facilities such as power grids, water treatment plants, and oil and gas refineries. However, these networks are increasingly becoming targets for cyber-physical attacks. To help asset owners combat this, we have released a new and innovative ICS/SCADA monitoring sensor called OTNetGuard™. OTNetGuard is designed to capture analog, serial, and IP ICS/SCADA communications passively and securely. Combined with Cynalytica’s AnalytICS Engine capabilities to provide ICS communications deep packet inspection, advanced analytics and monitoring it can also easily integrate with third party SIEM and SOAR platforms.
Cynalytica is now extending and integrating the power of the SerialGuard® AnalytICS Platform for Industrial IoT/OT customers with Splunk®. This new partnership means that Splunk® users can now easily and securely capture real-time serial data from the lowest layers of the ICS network via the SerialGuard® AnalytICS Platform and leverage Splunk’s world-class AI and machine learning capabilities to gain automated contextual threat detection, actionable operational insights, and unified threat intelligence across their OT and IT networks.
To mark Cybersecurity Awareness Month, we decided to tackle some of the most common myths in the ICS cybersecurity realm, while paying particular attention to legacy systems. Here are ten myths that we regularly come across.
Why system integrators need to fully embed Industrial Control Systems (ICS) cybersecurity capabilities into client delivered systems.
Historically, Industrial Control Systems (ICS) could exist as a closed-loop, with an air-gapped network and a solid physical security program insulating them from the outside world. An operator could trust the integrity of their operations based on process outputs, and when processes broke down maintenance was brought in to locate and fix the issue.
DNP3 – Distributed Network Protocol 3.0 – is the second most-widely used serial communications protocol in Industrial Control Systems (ICS), after Modbus. As EPRI (Electric Power Research Institute) mentioned in a 2019 technical update: “it is the most widely used utility communications protocol in North America”