News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Gaps in OT security
Gaps in OT security

The results of a survey show that companies are increasingly interested in ensuring secure and resilient operations while working to implement more effective OT security. 200 executives were surveyed to identify top OT cybersecurity challenges and priorities. The research found that industry concerns about cyber threats are increasing, with 58% of organizations rating their OT cybersecurity risk as high or critical. However, only 47% of surveyed organizations have an OT cybersecurity solution in place, and 81% of respondents still manually manage OT risk — and in…

Read more

Microsoft DCOM hardening tool discovers vulnerabilities
B2B Cyber ​​Security ShortNews

Open-source detection tool uncovers vulnerabilities in DCOM ahead of Microsoft's March 2023 patch. Users can quickly determine if their networks contain unsecured DCOM made unusable by the new Microsoft patch. OTORIO has released the open-source Microsoft Distributed Component Object Model (DCOM) Hardening Toolkit. The aim is to protect OT systems from possible problems related to an upcoming Microsoft patch. Because Microsoft itself writes: “14. March 2023, hardening changes are enabled by default with no option to disable them. At this point, you must resolve any compatibility issues with the hardening changes and applications in your environment." Test,…

Read more

NIS2 is not sufficient
B2B Cyber ​​Security ShortNews

In view of the increasing discussion about cyber attacks on IT and OT environments, the need for stricter legal requirements for companies and organizations, especially in critical sectors, is being discussed in public. NIS2 will replace the existing EU cyber security law, the 2016 Directive on the Security of Network and Information Systems. According to NIS2, organizations in various sectors should ensure that the networks and systems they use to provide services and carry out their activities achieve a higher level of cyber security. Inadequate prescription Kay…

Read more

Large OT attacks ensure higher security budgets
Large OT attacks ensure higher security budgets

The 2022 OT Cybersecurity Survey Report shows the significant increase in cyber risks against the background of large-scale OT attacks. In response, organizations are increasing their security budgets for OT security. American and European companies were surveyed. Otorio, a provider of next-generation OT cyber and digital risk management solutions, reveals the current state of OT security in its 2022 OT Cybersecurity Survey Report. 98 percent of those surveyed reported an increase in cyber risks over the past three years. 67 percent of respondents said risks have increased significantly, and 31 percent…

Read more

Modern vulnerability management in IT and OT
Modern vulnerability management in IT and OT

The measurement and improvement of IT security has now arrived at many companies and is being pushed forward. The question of OT security, on the other hand, is still a closed book for many companies. OTORIO explains how IT and OT security can be promoted equally and what role vulnerability management and scoring play in this. What are the most efficient risk reduction measures that achieve the most effective risk reduction for a specific facility, process or an entire production facility? However, once the risk reduction measures are implemented and an acceptable residual risk remains, there is still more work to be done. The reason for this is,…

Read more

Cyber ​​warfare: critical infrastructure in the crosshairs
Cyber ​​warfare: critical infrastructure in the crosshairs

Not only the recent cyber attacks on critical infrastructures - energy, logistics, telecommunications - have shown how vulnerable many organizations and their infrastructures are. It becomes particularly critical when attacks affect both IT (information technology - PCs, servers, etc.) and OT (operating technology - machines, etc.). Daniel Bren, the CEO and co-founder of OTORIO, is a well-founded expert on the subject. As a former IT security chief of the Israeli army and today's entrepreneur, he knows many aspects of the problem: "In 1997, the US Department of Defense (DoD) conducted the first "cyber war games" under the operation "Eligible Receiver"...

Read more