Design and Implementation of OEM ICS Cybersecurity Frameworks

It can be difficult to develop and refine cybersecurity initiatives when you face numerous obstacles like legacy systems, architectural changes and much more. Explore how you can effectively establish your security objectives and what you need to meet them with Tripwire's Robert Landavazo and Mike Zavislak from Baker Hughes in this excerpt from the SANS Oil and Gas Solutions Forum.

Using "Update.exe" as a Case Study for Robust OT Cybersecurity

In 2020, car manufacturer Honda fell victim to a ransomware attack. Using a payload called “update.exe,” the attack crippled Honda’s international customer service and Financial Services wing for days. Although it affected two customer facing branches of this global corporation, the ransomware was designed to target and breach Honda’s critical ICS/SCADA environments.


Design & Implementation of OEM ICS Cybersecurity Frameworks: The Good, The Bad, and The Ugly

The cyber threat landscape today continues to pose a myriad of unique challenges. This is especially the case for industrial organizations due to factors such as aging equipment, poor design or implementation, skills gaps and a lack of visibility. These shortcomings are exacerbated by the mean time to breach detection, which continues to hover above 150 days on average.


How to Reduce the Risk of Misoperations in Your Bulk Electric Systems

Reliability is essential to the functionality of an electric power grid. This principle guarantees that a constant qualitative and quantitative supply of electric power is flowing from a provider to businesses, homes and more. It’s what enables electric power to drive life forward in modern society. As a result, there’s reason to be concerned about events that threaten the reliability of the power grid. Those events include misoperations.

xona systems

Zero-Trust: A New Buzzword That Ought to Stick

By Bill Moore, CEO and Founder, Xona Systems It has been a couple of weeks since RSA Conference, so I thought I would share some observations on the cybersecurity industry in general and what I believe needs to be employed into every enterprise that has crown jewels…or at least important customer and corporate data or critical industrial control systems.

xona systems

Xona Begins Implementation at a Major Utility (Use Case)

Recently, one of the largest major utilities distributors in North America was looking to upgrade their efficiency and security to match the changing landscape of operational security. More specifically, they were looking for a way to replace their old paper-recording methods of calibration and decided that their new solution had to be lightweight, wireless, and, most importantly, secure. Access to their Industrial Internet of Things (IIoT) needed to be airtight and protected.


Attacks Targeting ICS & OT Assets Grew 2000% Since 2018, Report Reveals

The digital threat landscape is always changing. This year is an excellent (albeit extreme) example. With the help of Dimensional Research, Tripwire found out that 58% of IT security professionals were more concerned about the security of their employees’ home networks than they were before the outbreak of coronavirus 2019 (COVID-19).

xona systems

Introducing XONA Critical System Gateway

• A franchisee sitting 2,000 miles away from corporate headquarters. • A contractor on her laptop in an airport. • An employee telecommuting from home. • An engineer accessing industrial controls from outside of the control room This is how the world works. To do their jobs, each one needs remote access to critical corporate applications. Sensitive data. Confidential files. Order entry, accounting, HR, and so much more.