Skip to content

OpenSSL Vulnerability – What It Means For Your OT Network

The cyber security community was deeply engrossed this week in the news that OpenSSL, the organization responsible for the software package that encrypts and secures communications across much of the internet, was about to release a patch for a newly discovered “Critical” vulnerability.

The original announcement on October 25th was met with a cyclone of reaction and commentary from security experts. However, after a few tense days of speculation, OpenSSL downgraded the vulnerability rating to “High” before publicly releasing details of the security flaw and the patch on November 1, 2022. Despite the lowered rating, and while the issue is turning out not to be the crisis that many experts had feared, this is still considered a potentially major security issue and it is important to understand it and take remedial action where necessary.

This blog will explain what OpenSSL is used for, the commotion caused by the announcement this week, what it means for your OT network’s cyber security, and offer SCADAfence’s analysts advice for protecting your network from the vulnerabilities.

Continue reading

The Rise of Post-Exploitation Attack Frameworks

The Cyber Kill Chain is a framework that outlines the stages of common cyberattacks and the points in the process at which attacks can be detected or intercepted. Developed by Lockheed Martin, this model contains seven phases: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objective.
Continue reading

Gartner’s Advice For Choosing The Right OT Protection For Your Network


If you are the person in your organization responsible for securing an OT network, you are probably feeling very popular these days. Your inbox is no doubt full of emails inviting you to ‘hop on a call’ or ‘download now’ or ‘schedule a demo’. Each one promising that they have the best OT cyber security solution. There’s an absolute glut of options right now, and the choices are growing at a rapid pace. What’s a CISO to do? What options are the most important? What features do you look for in a comprehensive OT solution?

Continue reading

5 Best Practices for Operational Technology (OT) Security

 

Why Do You Need Operational Network Security?

Modern operational technology (OT) networks are evolving due to developments such as the rise Industrial Internet of Things (IIoT), Industry 4.0, smart grid and more. In order to remain  competitive in their industries, organizations are adopting these beneficial technologies to optimize their operations and significantly cut operational costs.

These new technologies increase the connectivity and the complexity of operational environments, and as a result, their exposure to potential OT cyber attacks or damage caused by human error increases significantly. In the past, operators trusted network segmentation, isolation, or air-gapping as an effective security measure. But due to the increasing connectivity between the OT, IT and other networks, this is no longer true. Therefore adhering to OT security best practices, and deploying the most advanced OT security tools is critical for the protection, visibility, and control of OT environments.

Continue reading
×

Hello!

Click one of our contacts below to chat on WhatsApp

×