Industrial Security
Industrial Ethernet
Data Centers
Broadcast AV
Belden News
Blog Home
Blog Category: Industrial Security

Posted by: Greg Conary on August 16, 2017

Over the past decade or more the need for cyber security in industrial automation and control systems has been accelerating at an ever-increasing rate. Adoption of the benefits of commercial off-the-shelf and open technologies, awareness of the systems, exposure of the systems and precedents set by previous attacks have all contributed to the increase.

The advent of the Industrial Internet of Things (IIoT) pushes this even further with the increased uptake and reduced cost of powerful computing technologies like cloud, virtualization, shared networks and so on. How can IIoT and cyber security standards progress in tandem, to ensure that our increased capabilities are protected by increased security? Click Read More to learn how.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on August 09, 2017

In June 2017, researchers disclosed a new family of sophisticated malware that is designed to target and disrupt industrial control systems in power grids, specifically electric utility substations. “CRASHOVERRIDE” can ultimately cause a loss of power at substations and the concern is in its sophistication, modular design and extensibility to other industries and critical infrastructure.

The bottom line is, CRASHOVERRIDE is not your average malware and there is no “easy button.” Here is what you need to know, with findings and suggestions regardless of your industrial or critical infrastructure organization.

Read More >>


Comments (1)
Post a Comment

Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on July 11, 2017

Petya ransomware surfaced publicly in June 2017, starting first in the Ukraine, rapidly moving to Europe and now into the United States. This global ransomware epidemic will not only encrypt your systems – essentially denying you access to everything it holds – it also “wipes” (overwrites) the hard drive master boot record (MBR) so that it cannot boot up its operating system.

Without a backup, your system is dead and all the data lost. Some researchers believe even if the Bitcoin ransom were paid and keys obtained, they would not work to decrypt and restore your systems.

Read this blog to understand the basics of the Petya ransomware, how to know if your systems are vulnerable, and five security tips to consider as next steps to protect your operations.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on July 05, 2017

If you’re following industrial cyber security trends you know that industrial networks, endpoints and control systems typically have inherent weaknesses that make them insecure and vulnerable to compromise through digital methods.

So, it shouldn’t come as a big surprise to learn that the May 2017 report, Rogue Robots: Testing the Limits of an Industrial Robot’s Security, tells us that industrial robots are insecure too, and for many of the same reasons.

However, what might surprise industrial firms with robotic applications is how much cyber risk exists within their robotic ecosystem. Read more to learn findings and tips – whether or not you have robotics systems in your environment.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on November 30, 2016

In 2016, 5.5 million connected devices are being added per day with an estimate of 20+billion internet-connected “things” running our world by 2020. Many view this future with optimism due to the increased speed, efficiency and innovation this pervasive connectedness will bring to our lifestyles.

Others find it threatening to privacy and confidentiality. Security experts worry that our dependence on connected devices is developing more quickly than our ability to secure them. For our critical infrastructure and industrial businesses, there is real concern. Here’s why…

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on October 19, 2016

Self-described “Mr. Potatohead,” aka Sean McBride, gave a keynote address on Thursday, October 13, 2016 in Orlando, Florida at Belden’s annual Industrial Ethernet Infrastructure Design Seminar (IEIDS).

Sean is the lead analyst for critical infrastructure at iSight, specialists in securing industrial control systems (ICS) and operations environments. iSight was acquired by FireEye in January 2016. It was a privilege to hear Sean speak live – giving an exceptional keynote drawn from both his life experiences in the Idaho potato industry and from his years in forensic and analyst work to help secure critical infrastructure and industrial control systems.

To learn more about Sean’s perspective and the “Subversive Six”….

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on October 05, 2016

Risks to the control levels of industrial networks have been on the rise – and yet some ICS professionals are not aware of the kinds of vulnerabilities and weaknesses these environments often have. The SANS 2016 State of ICS Security Survey indicates attacks on their ICS is a growing concern of those surveyed.

This blog is the third part of a series expanding on industrial cyber security approaches from Belden (part 1) and Tripwire (part 2). This article will address the importance of securing industrial controllers in an ICS operations environment (also referred to as OT by some) to reduce risk.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on September 20, 2016

The SANS 2016 State of ICS Security Survey Report indicates that many of the ICS professionals who responded to the survey have new job titles such as ICS cyber security program manager, ICS security project manager, IT/OT architect and director of cyber security for building and facilities systems.

This trend indicates that industrial cyber and cyber-physical security is a rising priority and industrial companies are beginning to assign staff with ICS security responsibility. While attending the recent EnergySec 12th annual security summit held in Anaheim, California on August 22-24, I spoke to many ICS operations attendees with new job titles and security responsibilities reflecting this priority. They had come to EnergySec for information sharing and practical guidance on the security challenges they’re facing.

While there I had a chance to ask EnergySec’s new president Steve Parker a few questions about EnergySec, trends, concerns and the state of ICS security within power and energy critical infrastructures.

For those of you who may not be familiar with this non-profit organization, they are approaching 1500 members and 470 member organizations, have achieved SANS Institute awards, and a good history of their grass-roots founding over a decade ago is posted on their website.

Read More >>


Comments (0) Post a Comment

Follow Us

Subscribe
Industrial Security
RSS Feed
Industrial Security
Email Notifications

Search
Industrial Security Blog
All Belden Blogs


Stay Informed