Industrial Security
Industrial Ethernet
Data Centers
Broadcast AV
Belden News
Blog Home
Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on December 14, 2016

The holidays are here and warnings of prudent internet security practices abound for home systems, online shoppers and social media participants. Many of us have received workplace guidance for increasing the cyber security and safety of our ICS networks, endpoints and control systems given the ongoing cyber threat landscape.

Though you might not consider yourself particularly savvy regarding internet security, the basics you’ve learned at work may be worth applying at home during this holiday time to improve your family’s cyber safety. This blog addresses a couple of foundational controls that you can use to improve your family’s home security.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on November 30, 2016

In 2016, 5.5 million connected devices are being added per day with an estimate of 20+billion internet-connected “things” running our world by 2020. Many view this future with optimism due to the increased speed, efficiency and innovation this pervasive connectedness will bring to our lifestyles.

Others find it threatening to privacy and confidentiality. Security experts worry that our dependence on connected devices is developing more quickly than our ability to secure them. For our critical infrastructure and industrial businesses, there is real concern. Here’s why…

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Industrial IT Team on November 16, 2016

Here’s your situation - industrial security is a hot topic today and management has decided to assign you the task to take an assessment and come up with a plan to protect the company from… well, they didn’t exactly say.

Perhaps some budget support was provided for this task and perhaps not. Nevertheless, doing nothing is not an option.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on November 02, 2016

There is an elephant in the industrial infrastructure control room. Much of the equipment in use within many of the US critical infrastructure sectors is at risk of aging out while still in production use.

It was therefore no surprise when a large California city proposed funding for a new power generation and water treatment plant to increase capacity and replace aging infrastructure.
What was a surprise was that the new state-of-the-art plant was plagued with network communication problems and failing PLCs.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on October 19, 2016

Self-described “Mr. Potatohead,” aka Sean McBride, gave a keynote address on Thursday, October 13, 2016 in Orlando, Florida at Belden’s annual Industrial Ethernet Infrastructure Design Seminar (IEIDS).

Sean is the lead analyst for critical infrastructure at iSight, specialists in securing industrial control systems (ICS) and operations environments. iSight was acquired by FireEye in January 2016. It was a privilege to hear Sean speak live – giving an exceptional keynote drawn from both his life experiences in the Idaho potato industry and from his years in forensic and analyst work to help secure critical infrastructure and industrial control systems.

To learn more about Sean’s perspective and the “Subversive Six”….

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on October 05, 2016

Risks to the control levels of industrial networks have been on the rise – and yet some ICS professionals are not aware of the kinds of vulnerabilities and weaknesses these environments often have. The SANS 2016 State of ICS Security Survey indicates attacks on their ICS is a growing concern of those surveyed.

This blog is the third part of a series expanding on industrial cyber security approaches from Belden (part 1) and Tripwire (part 2). This article will address the importance of securing industrial controllers in an ICS operations environment (also referred to as OT by some) to reduce risk.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on September 20, 2016

The SANS 2016 State of ICS Security Survey Report indicates that many of the ICS professionals who responded to the survey have new job titles such as ICS cyber security program manager, ICS security project manager, IT/OT architect and director of cyber security for building and facilities systems.

This trend indicates that industrial cyber and cyber-physical security is a rising priority and industrial companies are beginning to assign staff with ICS security responsibility. While attending the recent EnergySec 12th annual security summit held in Anaheim, California on August 22-24, I spoke to many ICS operations attendees with new job titles and security responsibilities reflecting this priority. They had come to EnergySec for information sharing and practical guidance on the security challenges they’re facing.

While there I had a chance to ask EnergySec’s new president Steve Parker a few questions about EnergySec, trends, concerns and the state of ICS security within power and energy critical infrastructures.

For those of you who may not be familiar with this non-profit organization, they are approaching 1500 members and 470 member organizations, have achieved SANS Institute awards, and a good history of their grass-roots founding over a decade ago is posted on their website.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on September 07, 2016

It’s not a surprise that ensuring the reliability and availability of control systems is the number one business driver for securing industrial automation systems. It was confirmed in the SANS 2016 State of ICS Security Survey.

Combine this concern with the fact that 67% of SANS Survey respondents perceived a severe or high level of threats to control systems, up from 43% in 2015, and it’s clear that effective industrial security programs are needed.

To help, our company has recently introduced a new approach to industrial cybersecurity called Belden 1-2-3. It divides security measures down into three areas: securing the network, securing the endpoints and securing the controllers.

You don’t have to approach the three areas in the 1-2-3 order. Instead, start your focus in the area that aligns with the highest risk to your systems and fits with where your organization is in its security journey.

This article is going to start at 1, however, and examine the whys and hows of “Securing Industrial Networks.”

Read More >>


Comments (0) Post a Comment

Follow Us

Subscribe
Industrial Security
RSS Feed
Industrial Security
Email Notifications

Search
Industrial Security Blog
All Belden Blogs


Stay Informed