ICS Cybersecurity Blog

Industrial Control Systems Cybersecurity Blog

See the latest industrial control systems cybersecurity blog posts, reports and news items from the Industrial Defender team.

Establishing OT Cybersecurity Fundamentals with the 20 CIS Controls

The 20 CIS Controls help security practitioners build the foundation of a sound OT cybersecurity program. Learn what these controls are and how they can benefit you.

Read full post

Making Smarter Risk Management Decisions with OT Endpoint Data

Industrial control system environments pose unique risk management challenges. Having accurate OT endpoint data is critical to make smarter decisions.

Read full post

4 Benefits of Implementing a Cybersecurity Solution for Building Management Systems

Cyber threats and vulnerabilities in critical building management systems are increasing every year. Learn why you should implement a cybersecurity solution.

Read full post

Industrial Defender Strengthens OT Asset Anomaly Detection Platform and Assisted Passive Network Monitoring Engine to Automate Risk Quantification and Reporting

Industrial Defender announces enhancements to their ASM product, including automated risk scoring for operational technology (OT) assets, new Assisted Passive Monitoring (APM) technology, and simplified executive-level NIST CSF reporting.

Read full post

CodeMeter Vulns: Why Complete Software Inventory Data Is Critical for ICS

CodeMeter is a software licensing program that is a critical component to the operation of many ICS. Severe vulnerabilities were recently found in this program.

Read full post

Industrial Defender Announces Strategic Partnership with DeNexus

Industrial Defender and DeNexus announce a strategic partnership to mitigate cybersecurity risk in mission-critical networks across the world.

Read full post

CVE-2020-1350 “Wormable” Flaw in Microsoft Windows Server Could Cause Major Issues for ICS/OT World

Every Microsoft Windows Server OS back to 2003 is impacted by CVE-2020-1350. Even worse, it’s being a called a “wormable” flaw, meaning it can transmit system to system all by itself. No emails, no user interaction, just good old fashioned TCP/IP.

Read full post

Video: How To Monitor High-Value OT Assets in Microsoft Power BI

Learn how to leverage Microsoft Power BI and Industrial Defender for executive level dashboarding, high-value asset identification and enhanced insight into OT operations.

Read full post

Video: OT SOC Enablement with Splunk

Learn how Industrial Defender can assist CISOs with their IT/OT convergence and SOC operational strategies, and help SOC Analysts and ICS Engineers quickly diagnose security events.

Read full post

DefenderSphere 2020 – Mapping the ICS Market

The world of industrial control systems is very complex. As you are already aware, there is no silver bullet for managing and securing ICS environments. At Industrial Defender, our belief is that knowing what (and who) you have in your environment is key to solving these challenges, and that is why we created the DefenderSphere.

Read full post