Industrial Security
Industrial Ethernet
Data Centers
Broadcast AV
Belden News
Blog Home
Blog Category: Industrial Security

Posted by: Industrial IT Team on May 11, 2016

Energy and electric utility organizations are facing a range of challenges requiring a reevaluation of the cyber security within their industrial control networks, endpoints and controllers.

On the one hand, operators have to face losing access to phone lines, securing transmission substations, meeting pressing NERC CIP audit requirements and worrying about Internet connections to vital systems. On the other hand, they are confronted with evidence that indicates an increase in cyber attacks on energy Industrial Control Systems.

Given this environment and the importance of energy systems as critical infrastructure, Belden has increased its focus on cyber security solutions for the energy sector. This includes our recent announcement of the new Tofino Xenon for Energy product line. Most importantly, this offering includes modules for securing the DNP3 and IEC 60870-5-104 (IEC 104) protocols for electric power and SCADA systems.

If you are involved with cyber security for energy, power or electric utility systems, read on to find out why this new product line is a game changer for protecting critical assets.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Jeff Lund on May 04, 2016

While there are many benefits that have come to ICS and SCADA networks through the increased use of standard networking and Internet technologies, it has made the need to secure them ever more critical.

Firewalls play an important role in blocking threats and containing internal cyber incidents that could impact safety, reliability and productivity. They control the flow of communications and filter packets to block or contain harmful network traffic.

There are a number of technologies used to filter packets including Access Control Lists, Stateful Inspection and Deep Packet Inspection.

This article examines the essential firewall filtering concepts you need to know to make informed choices for designing a Defense in Depth security architecture.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Richard Weatherburn on April 20, 2016

Who hasn’t been frustrated when traffic comes to a standstill or the underground breaks down? Such frustration is a very real human emotion that lets us know that our highways, subways, light rail transit systems etc. are vital for our lives to run smoothly.

Why then have some critical infrastructure industries, such as the energy sector, been better at adopting cybersecurity practices while the transportation sector has been lagging in this area?

The answer, I think, is that never before has the transportation industry been under such pressure to increase capacity and at the same time become more efficient.

Let’s take a look at how, in this challenging environment, passenger rail and public transportation systems can improve their Industrial Control Systems (ICS) security.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: on April 06, 2016

Thanks to the recent 2016 Data Breach Digest from the Verizon RISK team, a story about poor cybersecurity at a water company has recently been in the media. The company, given the fictional name of the Kemuri Water Company (KWC), is responsible for the water supply of a number of counties.

Verizon was retained by KWC to assess their networks for indications of a security breach. They identified that breaches had occurred and that KWC’s SCADA system had been manipulated to alter the amount of chemicals that went into their water system as well as the flow rate.

Several significant security weaknesses were identified including poor network segmentation and the lack of use of Defense in Depth best practices. Let’s take a closer look at the KWC situation and compare it with another water/wastewater company that proactively segmented and secured its systems.

Read More >>



Blog Category: Industrial Security

Posted by: Erik Schweigert on March 23, 2016

Someone recently asked me the best way to describe Deep Packet Inspection (DPI) in layman’s terms.

Think of an envelope in snail mail. You can recognize it as an envelope and you can even see who it is from and where it is going.

This could be mapped to a standard firewall where you can limit the IP address by source and destination, and even port information, but that is as complex as it gets. In terms of this example, the content inside a sealed envelope, such as a friendly letter, is where the real information lies protected; this is where DPI really occurs.

DPI comes in two flavors, as a signature-based system or a protocol-specific DPI engine. How do they differ and which is more useful for ICS security?

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Erik Schweigert on March 09, 2016

As a software engineer who creates industrial security technologies I am often asked “Why are industrial networks so hard to secure?” This is a big topic, so today I will address only “Why are PLCs so insecure?”

The answer to this requires a walk down memory lane. If you are a controls engineer you already know some of what I have to say, though maybe not the security considerations this article addresses.

If you have another job function or work in another group such as IT, this article might provide you with useful baseline knowledge about industrial control system (ICS) security.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Gary DiFazio on February 24, 2016

With the acquisition of Tripwire in 2015, Belden expanded its industrial cyber security offerings to include proactive security monitoring and regulatory compliance solutions. What exactly do these solutions bring to ICS security?

In short Tripwire solutions give visibility into the control network for things like unauthorized/unexpected changes, insecure configurations and identifying assets vulnerable to known exploits. This visibility provides situational awareness so that control engineers can keep the network operational.

Tripwire also provides compliance solutions that reduce costs for audit preparation by automating reporting and the collection of evidence. In particular, Tripwire offers a NERC CIP Solution Suite that helps utilities meet some of the more difficult CIP requirements – CIP-005, CIP-007 and CIP-010.

Let’s examine how Tripwire/Belden solutions are being used by one sector, bulk electricity suppliers, to reduce the costs and complexity associated with NERC CIP compliance as well as improve cyber security defenses.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: on February 10, 2016

This week, the largest electric utility trade show and conference in the U.S., DistribuTECH, is being held. One of the tracks in the conference portion of the event is “Defending the Grid.” The prominence of the topic at this show is due in part to new NERC CIP requirements designed to strengthen reliability and security. Another reason grid protection is a hot topic is high-profile cyberattacks such as the recent one on the Ukraine power system.

It adds up to one thing – it’s time to review the state of cyber defenses at your transmission substations. What then is the right approach to secure substations? It starts with the best practice of Defense in Depth.

Read More >>


Comments (2)
Post a Comment

Follow Us

Subscribe
Industrial Security
RSS Feed
Industrial Security
Email Notifications

Search
Industrial Security Blog
All Belden Blogs


Stay Informed