News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

OpenADR: Strategies for protecting critical infrastructure
B2B Cyber ​​Security ShortNews

Energy supplies are inherently targeted by attackers and sophisticated cyberattacks. The OpenADR Alliance, among others, is driving forward the urgently needed defensive measures and innovative strategies to protect critical infrastructure - and is primarily based on three supporting pillars. Communication within the energy industry is a delicate point. Connections between utility companies and end devices, such as private households or medium-sized companies, offer a large area of ​​attack. Because attacks on critical infrastructure have devastating consequences for energy supplies and the civilian population, the OpenADR communications standard is breaking new ground in terms of security...

Read more

Vulnerabilities in critical infrastructures
B2B Cyber ​​Security ShortNews

A global leader in cybersecurity solutions, today released “SIERRA:21 – Living on the Edge,” an analysis of 21 newly discovered vulnerabilities in OT/IoT routers and open source software components. The report was written by Forescout Research – Vedere Labs, which specializes in uncovering security vulnerabilities in critical infrastructure. The analysis highlights the ongoing risk to critical infrastructure and highlights possible mitigation measures. “SIERRA:21 – Living on the Edge” describes research on Sierra Wireless AirLink cellular routers and a number of associated open source components such as TinyXML and OpenNDS. Sierra Wireless Routers Are Popular: An Open Database on Wi-Fi Networks…

Read more

More cyber attacks on critical infrastructure
More cyber attacks on critical infrastructure

Critical infrastructures are increasingly becoming the focus of cybercriminals. More than half of the attacks come from groups close to the state. Rockwell Automation's global study, "Anatomy of 100+ Cybersecurity Incidents in Industrial Operations," conducted by Cyentia Institute, analyzed 100 cybersecurity events that pose an imminent threat to operational technology (OT) and /or industrial control systems (ICS). As a result, almost 122 data points were collected and evaluated for each incident. Energy producers are popular targets The first edition of the report shows that almost…

Read more

Solutions: From NIS to NIS2
From NIS to NIS2

NIS2 involves many more companies than NIS, better known as KRITIS. The change is a challenge for many. New technologies, such as NDR – Network Detection and Response, solve many requirements for companies. According to Swiss cybersecurity specialist Exeon Analytics, the version of the NIS Directive updated by the European Commission in January 2023, referred to as NIS2, has a significant impact on the way organizations belonging to the so-called critical infrastructures operate , manage and monitor their networks. NIS2 aims to increase resilience and responsiveness…

Read more

EU NIS2 Directive: How can companies best prepare?
EU NIS2 Directive: How can companies best prepare?

Many companies are affected by the new edition of the EU NIS2 directive. This increases the minimum requirements for the cybersecurity of critical infrastructures. Companies should be well prepared. Cyber ​​attacks on critical infrastructure are particularly dangerous. The EU therefore defined minimum cybersecurity requirements in the Network and Information Security (NIS) Directive in 2016. This is now being replaced by a new edition. The NIS16 directive has been in force since January 2023, 2 - and the EU member states still have until October 2024 to incorporate it into national law. In Germany this is done through the NIS2 Implementation Act,…

Read more

EU-NATO paper: Protect CRITIS from cyber attacks
Protect critical infrastructure from cyberattacks

EU-NATO task force on the resilience of critical infrastructure (KRITIS) in Europe declares energy, transport, digital infrastructure and space as key areas particularly worthy of protection. Discussions about how CRITIS can be best protected are also increasing in Germany. The four key areas that, according to the recently published EU/NATO paper, offer increased vulnerability to cyber attacks and are therefore particularly worthy of protection are energy, transport, digital infrastructure and space. Attacks on these targets are extremely worthwhile for criminals and saboteurs because of the potential damage to society. Special challenges in Germany This problem is…

Read more

NIS2 is not sufficient
B2B Cyber ​​Security ShortNews

In view of the increasing discussion about cyber attacks on IT and OT environments, the need for stricter legal requirements for companies and organizations, especially in critical sectors, is being discussed in public. NIS2 will replace the existing EU cyber security law, the 2016 Directive on the Security of Network and Information Systems. According to NIS2, organizations in various sectors should ensure that the networks and systems they use to provide services and carry out their activities achieve a higher level of cyber security. Inadequate prescription Kay…

Read more

NIS2 comes into effect
NIS2 comes into effect

The European Union NIS2 Directive comes into effect. With the second directive on the security of network and information systems, the EU is reacting to cyber attacks on socially particularly relevant institutions and organizations, which are increasing sharply in times of geopolitical crisis. The protection of critical infrastructure is to be further improved, the requirements for its operators are increasing significantly: On Monday, January 16, the NIS2 directive of the European Union will come into force. The EU is thus reacting to the sharp increase in cyber attacks in times of geopolitical crisis, which threaten institutions and organizations that are particularly relevant to society. Hurry is required, the threat situation…

Read more

IT Security Act 2.0: Protection of critical infrastructures

On May 1, 2023, the amendment to the IT Security Act 2.0 will come into force. When the transition period expires, the BSI is demanding new requirements from operators of critical infrastructure. What that will be in detail, who will be affected and what measures must be taken by then. A comment from Radar Cyber ​​Security. Cyber ​​criminals are increasingly targeting operators of critical infrastructures and companies with particular economic importance. This can not only lead to production losses worth millions and supply bottlenecks, but in the worst case it can endanger public safety. In addition, you have to…

Read more

Cyber ​​warfare: critical infrastructure in the crosshairs
Cyber ​​warfare: critical infrastructure in the crosshairs

Not only the recent cyber attacks on critical infrastructures - energy, logistics, telecommunications - have shown how vulnerable many organizations and their infrastructures are. It becomes particularly critical when attacks affect both IT (information technology - PCs, servers, etc.) and OT (operating technology - machines, etc.). Daniel Bren, the CEO and co-founder of OTORIO, is a well-founded expert on the subject. As a former IT security chief of the Israeli army and today's entrepreneur, he knows many aspects of the problem: "In 1997, the US Department of Defense (DoD) conducted the first "cyber war games" under the operation "Eligible Receiver"...

Read more