News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Large OT attacks ensure higher security budgets
Large OT attacks ensure higher security budgets

The 2022 OT Cybersecurity Survey Report shows the significant increase in cyber risks against the background of large-scale OT attacks. In response, organizations are increasing their security budgets for OT security. American and European companies were surveyed. Otorio, a provider of next-generation OT cyber and digital risk management solutions, reveals the current state of OT security in its 2022 OT Cybersecurity Survey Report. 98 percent of those surveyed reported an increase in cyber risks over the past three years. 67 percent of respondents said risks have increased significantly, and 31 percent…

Read more

More spyware and phishing against industrial companies
More spyware and phishing against industrial companies

In the first half of 2022, malicious objects were blocked on 12 percent of OT (operational technology) computers in Germany, as current analyzes by Kaspersky ICS CERT show. Worldwide it was 32 percent. Building automation infrastructures are the most vulnerable. Malicious scripts and phishing sites (JS and HTML) were the most common victims of industrial companies. Above all, the infrastructure for building automation is confronted with these threats: About half of the computers worldwide (42 percent) were dealing with them in the first half of the year. This is believed to be because these systems may not be fully supported by…

Read more

Webinar September 20, 2022: OT Jungle Expert's View
B2B Cyber ​​Security ShortNews

Fortinet invites you to a free webinar on September 20, 2022 from 10:00 a.m. with the topic "How to make your way through the jungle of paragraphs and requirements in OT environments". In addition to technical requirements, which are all too often simply answered with technical functions, many companies are also subject to regulatory requirements. These are, for example, IT-SiG 2.0, NIS 2.0, GDPR. But there is more and then there are also standards such as ISO 27k, IEC 62443 or IT-Grundschutz NIST CSF. Many companies have many unanswered questions. Webinar on September 20, 2022…

Read more

Modern vulnerability management in IT and OT
Modern vulnerability management in IT and OT

The measurement and improvement of IT security has now arrived at many companies and is being pushed forward. The question of OT security, on the other hand, is still a closed book for many companies. OTORIO explains how IT and OT security can be promoted equally and what role vulnerability management and scoring play in this. What are the most efficient risk reduction measures that achieve the most effective risk reduction for a specific facility, process or an entire production facility? However, once the risk reduction measures are implemented and an acceptable residual risk remains, there is still more work to be done. The reason for this is,…

Read more

Report on the state of IIoT and OT security
Report on the state of IIoT and OT security

Network and cloud security specialist Barracuda publishes its report on the state of IIoT and OT security "The State of Industrial Security in 2022". Manufacturing and health care bring up the rear when it comes to completed security projects. 800 IIoT/OT managers answered the survey. Cloud security specialist Barracuda surveyed 800 senior IIoT/OT managers worldwide about their experiences and views regarding IIOT/OT security in their companies. Barracuda presents the findings on IIoT/OT security projects, implementation challenges, security incidents and technology investments as well as topics related to cyber security risks with the current report The State of Industrial Security in 2022. KRITIS increasingly as a target of attack Critical infrastructures are increasingly being targeted by…

Read more

KRITIS still in sight one year after Colinial Pipeline & Co.
Tenable news

Tenable sees KRITIS operators exposed to increasing threat potential. Also one year after the severe attack on Colinial Pipeline & Co. with devastating effects. A comment from Tenable. “In the XNUMX months since ransomware attacks struck JBS Foods and Colonial Pipeline, the sad reality is that the threat to critical infrastructure operators has increased rather than decreased. Attackers only care about money - not impact Attackers recognize the impact they can have by influencing these environments and rely on it to launch their attacks with increasing accuracy and frequency...

Read more

Webinar June 28, 2022: What is an OT organization?
B2B Cyber ​​Security ShortNews

Fortinet invites you to a free webinar on June 28, 2022 at 10:00 a.m. on “What is an OT Organization?”. Experts explain how digitization and OT security are connected. Many OT security issues result from networks that have grown insidiously and responsibilities that are often not clearly defined. There are also new trends in automation and digitization, which increasingly require a high level of professionalism in OT. But how can this be reliably achieved? Webinar on Tuesday, June 28, 2022 from 10:00 a.m. “What is an OT organization please?” We will have a…

Read more

IoT Security Report 2022: Industrial controls at risk
IoT Security Report 2022: Industrial controls at risk

In the IoT Security Report 2022, IT experts call for a Bill of Materials (SBOM) for device software: Industrial controls, production and the smart home are often “insufficiently” protected against hackers. Experts demand proof of all software components used. Shampoo, biscuits, canned soup and medicines have one thing in common: the list of all ingredients on the package and their traceability from the manufacturer to the producer of the individual ingredient. Important smart industrial controls, intelligent production systems and devices such as routers, network cameras, printers and many others bring their firmware with the operating system and applications directly - without exact proof of the contained...

Read more

SASE network: connecting security and the cloud

A centralized approach in the cloud has as many limitations as an on-premises data center. But you can also connect a SASE network, security and the cloud. A comment from Stefan Schachinger, Product Manager Network Security - IoT/OT/ICS at Barracuda. The much-cited prophecy that life punishes those who come late seems to find its truth in IT network security as well. At the beginning of the pandemic, many companies were forced to switch from office work to home office - often with incomplete security regarding the IT infrastructure. A feast for hackers! Now remote work is not really something new;…

Read more

Webinar March 04, 2022: AirGap was yesterday - how do we protect connected OT environments?
Kaspersky_news

Kaspersky invites you to another round in its webinar series. This time the topic is "AirGap was yesterday - how do we protect networked OT environments?". The free webinar will take place online on March 4, 2022 from 10:00 a.m. The current threat situation remains tense: Not only is the number of cyber attacks increasing rapidly, the complexity is also reaching a whole new level. This poses enormous risks for companies of all sizes and from all sectors, because cyber attacks can completely paralyze operational processes and cause serious financial damage. Webinar March 04, 2022: “AirGap was…

Read more