Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: ICS Security
You are here: Home \ ICS Security
nymity_privacy_webinar
Posted on Tuesday, February 5th, 2019 by
If you look at the title of this blog article and aren’t sure what to answer, you’re not alone. Even industry veterans find it hard to disentangle cybersecurity and data privacy. There is a good reason for this. They are associated, even intrinsically linked, and they both have to deal with nefarious elements that would do...

Topics: Cloud Security, Compliance, Cybersecurity Posture, Digital Transformation, ICS Security, Internet of Things, Managed Security Services, Office 365 Security, Penetration Testing, Phishing, Privacy & Security, Security Practices, Vulnerability Assessment

IoT Security
Posted on Tuesday, December 18th, 2018 by
The IoT, as well as generating big data, opens up the attack surface to cyberthreats and it is massive and growing. And, as business embraces the technology, attacks on our data and infrastructure are at an all-time high. But how can organizations ensure the security of their IoT devices?

Topics: DDoS, ICS Security, Internet of Things, IoT Security

Dragonfly 2.0 Targets Energy Sector
Posted on Thursday, September 14th, 2017 by
DragonFly Group attacks energy companies in the US in hacking campaign against power and utilities sector. Attackers access to SCADA networks in an APT attack.

Topics: ICS Security

2017 Trends
Posted on Tuesday, July 25th, 2017 by
Recent trends in cybersecurity attacks: threat actors involved, tactics used, and the industries targeted. The intent of this analysis of cybersecurity incident information can hopefully help organizations improve threat response time, improve cybersecurity defenses, and allocate cybersecurity resources more effectively.

Topics: DDoS, ICS Security, Phishing, Privacy & Security, Ransomware, Security Practices

Industrial building factory
Posted on Tuesday, May 9th, 2017 by
The majority of organizations still do not have the necessary security tools and processes in place to properly protect their industrial networks against malware. Meanwhile, the news is flooded with stories about malware such as Irongate and Stuxnet, developed specifically to attack and disrupt large-scale ICS and supervisory control and data acquisition (SCADA) environments in industrial facilities like power plants, waste processing systems, dams, and similar operations.

Topics: ICS Security

industrial-control-systems-and-internet-technologies-a-tale-of-two-industries
Posted on Wednesday, September 14th, 2016 by
Can Industrial Control Systems and Internet Technologies work together? We’ve come a long way since the time when the merging of these two technologies was first discussed in earnest. While progress has been made, we still have a long way to go. Industrial Control Systems Security remains a critical issue...

Topics: ICS Security

Intrusion Detection Systems (IDS) in the Context of Smart Grids and Industrial Control Systems
Posted on Thursday, April 14th, 2016 by
Should we care about Cyber-Physical System Security? You have probably heard about Stuxnet. This was a well-known instance of a cyber-physical attack in 2010 with the goal of derailing the uranium enrichment process at an Iran’s nuclear plant. This is a perfect example of a security breach in cyberspace which adversely affected the physical world. This interconnection between cyberspace and physical space offers tremendous possibilities to hackers and adversaries to do nation-wide critical infrastructure damage.

Topics: ICS Security, Security Practices

Latest Webinars | Watch Now

 

The Next Generation of Managed Security, in collaboration with PCM.

Watch Now

Reporting Data Privacy Obligations to the Board: A Practical Approach to Ongoing Compliance, in collaboration with Nymity.

Watch Now

Subscribe

Recent Videos

What is Penetration Testing?

What is a Vulnerability Assessment?

What is a Control Assessment?


More