Divide between IT and OT teams stops businesses having a unified security strategy


A cultural divide between IT and operational technology (OT) teams is preventing organizations from having a unified strategy to protect both environments.
A report from Dragos and the Ponemon Institute shows only 43 percent of organizations have cybersecurity policies and procedures that are aligned with their ICS and OT security objectives.
ICS vulnerabilities on the rise as attacks increase


Industrial control system (ICS) vulnerability disclosures are increasing as recent high-profile cyberattacks on critical infrastructure and industrial enterprises have made ICS security a mainstream issue.
The latest biannual ICS Risk & Vulnerability Report released today by Claroty shows a 41 percent increase in ICS vulnerabilities disclosed in the first half of 2021 compared to the previous six months, which is particularly significant given that in all of 2020 they increased by 25 percent from 2019 and 33 percent from 2018.
Critical vulnerabilities found in cloud-based ICS management systems


There are lots of good reasons for moving industrial control systems to the cloud including better telemetry and analysis of device performance, management of logic and remote device configuration, improved diagnostics and troubleshooting, a centralized view of processes.
But as more operational technology and lCS make the move, they become increasingly vulnerable to threats. ICS security specialist Claroty has unveiled its new Team82 research arm along with a report on critical vulnerabilities found in cloud-based management platforms for ICS.
Critical manufacturing vulnerabilities soar in 2021


New research shows that critical manufacturing vulnerabilities rose 148 percent in the first half of 2021 with ransomware-as-a-service driving attacks.
The report from Nozomi Networks finds ICS-CERT vulnerabilities increased by 44 percent too. Manufacturing is the most susceptible industry with the energy sector proving vulnerable too.
Claroty launches zero-infrastructure security for industrial enterprises


As recent attacks have shown, industrial networks need protection. But it needs to work in a way that doesn't add burdens of infrastructure, complexity and steep learning curves.
Claroty is addressing this with the release of Claroty Edge, a new addition to The Claroty Platform that delivers visibility into industrial networks without requiring network changes, using sensors, or having any physical footprint.
Predictive maintenance can save millions for process manufacturers


Predictive maintenance, or PdM, is a rising star for process plants. It’s a new approach to maintenance planning that uses industrial Internet of Things (IIoT), big data, and machine learning to track the condition of plant equipment and detect the first signs of impending part failure.
Predictive maintenance is a specific application of predictive analytics for plant equipment. By issuing early alerts about potential failures, PdM enables maintenance crews to schedule repairs before the part breaks down entirely, at a time that’s convenient for them. PdM really showed its worth during COVID-19, as many plants operated on a skeleton staff with maintenance teams only coming on-site at intervals.
The growing risk from critical infrastructure cyberthreats [Q&A]


The more reliant businesses become on technology the more risk they face from a range of cyberthreats. This is especially true when it comes to critical infrastructure as it's an attractive target for nation state and other attackers.
We spoke to James Carder, chief security officer and vice president of labs at SIEM platform LogRhythm to discover more about critical infrastructure threats and how to guard against them.
ICS vulnerabilities increase as remote work boosts attack surface


Disclosed vulnerabilities in industrial control systems (ICS) increased 335 percent in the second half of 2020 compared to the first half.
A new report from Claroty also shows that in the same period 71 percent of ICS vulnerabilities disclosed were remotely exploitable through network attack vectors.
Claroty offers remote incident management as part of its operational security platform


Digital transformation initiatives have meant IT and operational technology (OT) networks becoming more interconnected and the switch to remote working has only accelerated this.
In response to this trend, OT security specialist Claroty has updated its platform to offer remote incident management as a fully integrated capability that spans the entire incident lifecycle.
Industrial companies face increased cyber threats


A new study finds that 56 percent of IT and operational technology security professionals at industrial enterprises have seen an increase in cybersecurity threats since the start of the COVID-19 pandemic in March.
In addition, the research from Claroty, based on a global, independent survey of 1,100 full-time IT and OT security professionals, shows that 70 percent have seen cyber criminals using new tactics to target their organizations in this time frame.
70 percent of ICS vulnerabilities can be exploited remotely


A new Biannual ICS Risk and Vulnerability Report, released today by Claroty, reveals that more than 70 percent of industrial control system (ICS) vulnerabilities disclosed in the first half of 2020 can be exploited remotely.
Earlier this week we looked at how project files can be used to attack ICS systems even if they're air-gapped, but this report highlights the importance of protecting internet-facing ICS devices and remote access connections.
How ICS project files can be used to attack businesses [Q&A]


Industrial control systems (ICS) are usually kept separate from internet facing and other business applications. But researchers at Claroty have discovered a way to exploit ICS project files as an attack vector.
The attack was demonstrated at the recent DEF CON conference. We asked Nadav Erez, Claroty's research team lead, to explain more about why these files are particularly attractive to attackers.
Protecting IoT and OT with zero trust and network segmentation [Q&A]


In recent years we've seen a surge in the numbers of IoT and operational technology devices appearing on networks.
But while this technology offers many advantages it also brings new risks, both for the devices themselves and the networks they're attached to. What can businesses do to benefit from the technology but still keep their networks safe?
Critical infrastructure attacks more worrying than data breaches for most security pros


According to a new survey of 1,000 IT security professionals around the world, 74 percent are more concerned about a cyber attack on critical infrastructure than an enterprise data breach.
The study by Claroty reveals 62 percent of global respondents believe that industrial networks are properly safeguarded against cyber attacks and 60 percent believe their country’s critical infrastructure is adequately protected.
5G and risks to critical infrastructure [Q&A]


The speed and bandwidth of 5G means that as the roll out continues a lot of industrial automation equipment will eventually be on the 5G network.
So what can be done to protect the integrity and availability of manufacturing networks and other critical infrastructure? We spoke to Dave Weinstein, CSO of Claroty to discuss the link between 5G and the cyber security of critical infrastructure.
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.