Industrial Security
Industrial Ethernet
Data Centers
Broadcast AV
Belden News
Blog Home
Blog Category: Industrial Security

Posted by: on September 15, 2014

The age of malware specifically targeting ICS systems began in 2010 when Stuxnet was revealed to be disrupting operations at one of Iran’s nuclear enrichment facilities. Since that shock we have seen advanced malware such as Flame and Duqu target energy companies for espionage purposes and unsophisticated but highly effective malware massively infiltrate Saudi Aramco.

Today I am writing to let you know about a new malware, coined as coming from the “Dragonfly hacking group” by Symantec. What does this have to do with everyday ICS and SCADA security? Let’s take a look at the Dragonfly malware in more detail and see what we can learn from it.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: on September 10, 2014

The End of Service (EOS) for Windows XP means it is going to be harder to keep existing industrial networks cyber secure and available.
Fortunately there is an easy fix for mitigating Windows XP risk now. It is as simple as installing industrial firewalls to protect your control networks from malware, whether introduced accidentally or maliciously.

Now, many vendors’ claim that using their products is “easy”. Just like programming a VCR was never as easy as it was cracked up to be, you might be suspicious of our assertion that installing industrial firewalls is easy.

Today one of my colleagues shows you just how easy it is

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Frank Williams on August 27, 2014

Industrial network security is a top of mind concern for managers in industrial automation organizations. However, there isn’t a simple formula for applying it and many engineers either don’t know where to start or don’t know how to develop practical skills in this area.

For those of you looking for a straight forward solution, consider attending our upcoming Industrial Ethernet Infrastructure (IEI) Design Seminar, being held Sept. 21-24 in Houston, Texas. Many of Belden’s top security experts will be there presenting a special “track” of sessions related to network security. Our goal is to help event attendees learn where to start with their security strategy, in a practical way that’s not overwhelming or complicated.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Industrial IT Team on July 30, 2014

When I started Tofino Security in 2006, my two goals were to make industrial cyber security easy to deploy and better suited for the real needs of mission critical networks. Our first generation products went a long way in doing that, but like any initial offerings they reflected a limited feedback loop from users in the field.

Today I am proud to say that we have integrated lessons learned over the last eight years to deliver Tofino 2.0, our next generation of industrial cyber security solutions.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: on July 09, 2014

Time to Pay Attention to the NIST Guide to ICS Security

About 6 months ago I wrote an article for this blog about the NIST Cybersecurity Framework. The article described how the framework came to be, what it is, what it is supposed to do and what you should do about it.

If you have any interest in industrial cyber security you will want to download the latest version of the framework and have it on hand for reference. If you are in a critical infrastructure industry your organization needs to go one step further and become familiar with its content.

In this article I am going to discuss the newly revised ICS Security Guideline – NIST 800-82 Rev. 2 – and offer some useful thoughts on it.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Industrial IT Team on June 25, 2014

Recently I spoke at the International NCSC One Conference 2014 at the World Forum in The Hague. I had 950 people (!) listen to my talk on “The Internet of Insecure Things “.

I also got to listen to some great talks, the highlight being the plenary speech by Jon Callas on the second day. It was called “Security and Usability in the age of Surveillance” and it focused on Bring Your Own Device (BYOD) security.

Jon’s talk looked at whether or not using your own iPhone to access your company’s email increases or decreases corporate security. It also raised some questions that are core to cyber security in the 21st century. In today’s article I am going to recap Jon’s key points and provide my own perspective on what the BYOD security question means to the SCADA world.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Frank Williams on June 11, 2014

System Integrators play an important role in helping manufacturers benefit from industrial automation technologies. They design and implement sophisticated control systems and their expertise, project management skills and manpower help companies achieve advances that cannot be realized with internal resources.

If your company is a System Integrator or Control System Integrator then you have likely been building up your expertise in the area of industrial cyber security as demand for services related to this topic has grown.

I’m writing today to let you know about how the end of service for Windows XP, and the industrial cyber security risk it creates, is a significant business opportunity for you. I also explain provide Belden resources to help you execute on this opportunity.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Mike Miclot on May 28, 2014

If your job mandate includes maintaining uptime then network security is an area you can’t afford to ignore. In the industrial space the biggest risk comes from accidental network introductions, such as a virus introduced by a supplier or an employee via a USB drive. Once that happens, your manufacturing or process control operations could be in jeopardy.

In the two videos in this article I explain how cyber security risk is different in the industrial environment than in the IT or office environment. I then zero in on how risk has been increased with the end of service for Windows XP and I explain how industrial firewalls can help.

Read More >>


Comments (0) Post a Comment

Follow Us

Subscribe
Industrial Security
RSS Feed
Industrial Security
Email Notifications

Search
Industrial Security Blog
All Belden Blogs


Stay Informed