-
Tyler Reguly
Guide
What Experts Have to Say About Choosing the Right Cybersecurity Frameworks
Frameworks like the Center for Internet Security (CIS) Controls, MITRE ATT&CK and the National Institute of Standards and Technology (NIST) Cybersecurity Framework give organizations clear, step-by-step methodologies for protecting their sensitive data, leveraging a wealth of industry knowledge to take the guesswork out of your security program.
While these cybersecurity...
Blog
Top 7 Technical Resource Providers for ICS Security Professionals
By Anastasios Arampatzis on Wed, 05/15/2024
Image
Attacks against industrial control systems (ICS) are on the rise. Cyberattacks are more prevalent, creative, and faster than ever. So, understanding attackers' tactics is crucial. The IBM Security X-Force Threat Intelligence Index 2023 highlights that backdoor deployments enabling remote access to ICS systems were the most...
Blog
So You Want to Achieve NERC CIP-013-1 Compliance...
By Anastasios Arampatzis on Wed, 03/06/2024
Image
Energy efficiency and availability is a major concern for all countries and governments. The electric grid is a vital sector, and any malfunctions will create ripple effects on any nation’s economy. As the grid is heavily dependent on cyber-enabled technologies and a vast chain of suppliers, contractors, and partners, the...
Blog
What Are the Top 7 DDoS Mitigation Tactics for Energy Grids?
By Emily Newton on Tue, 03/05/2024
Image
Distributed Denial of Service (DDoS) attacks occur when adversaries overwhelm a connected target’s resources, aiming to make it unavailable. Learning the best strategies to protect from DDoS attacks is critical to energy grid cybersecurity. A well-planned DDoS attack on the grid could halt essential services, cause substantial...
Blog
Improving OT Security in Industrial Processes
By Lane Thames on Tue, 02/27/2024
Image
Have you ever considered that even before you enjoy the first sip of your favorite morning beverage, you have probably interacted with at least half of the 16 critical infrastructure sectors that keep a nation running? In one way or another, the simple act of brewing a cup of tea would probably not be possible without...
Blog
WaterISAC: 15 Security Fundamentals You Need to Know
By Stefanie Shank on Wed, 01/24/2024
Image
2023 saw two concerning attacks on public water systems, highlighting the fragility and risk to utility systems. In Pennsylvania, malicious hackers breached the Municipal Water Authority of Aliquippa system the night after Thanksgiving. The criminals were making a political statement: the technology used to manage water pressure...
Blog
US Agencies Issue Cybersecurity Guide in Response to Cybercriminals Targeting Water Systems
By Graham Cluley on Mon, 01/22/2024
Image
US federal agencies have teamed up to release a cybersecurity best practice guidance for the water and wastewater sector (WWS).
The Cybersecurity and Infrastructure Security Agency (CISA), United States Environmental Protection Agency (EPA), and Federal Bureau of Investigation (FBI) have published the guide in an attempt to...
Blog
Resolving Top Security Misconfigurations: What you need to know
By Jeff Moline on Mon, 01/22/2024
Image
One of the most common factors that can lead to cybersecurity incidents is a security misconfiguration in software or application settings. The default settings that come with the implementation of these tools and solutions are often not configured securely, and many organizations do not invest the time and resources into...
Blog
Expert Insight for Securing Your Critical Infrastructure
By Ted Rassieur on Mon, 01/15/2024
Image
At Tripwire's recent Energy and NERC Compliance Working Group, we had the opportunity to speak with the Manager of Gas Measurement, Controls, & Cybersecurity at a large energy company. More specifically, we focused on SCADA and field assets of gas Operational Technology. The experience at the management level of such an...
Blog
How Does IoT Contribute to Real-Time Grid Monitoring for Enhanced Stability and Fault Detection?
By Emily Newton on Tue, 11/14/2023
Image
More decision-makers are investing in grid modernization efforts, knowing that doing so is necessary for keeping pace with modern demands. For example, smart grid fault-detection sensors could warn utility company providers of problems in real time, preventing costly and inconvenient outages. Technologies like the Internet of...
Blog
What is NERC? Everything you need to know
By Michael Betti on Tue, 10/03/2023
Image
Electric grids are part of every nation’s critical infrastructure. Every societal activity and business depends on reliable and safe electricity distribution. The US electric grid is a huge network of powerlines, distribution hubs, and renewable and non-renewable energy generators that is increasingly exposed to cyber-physical...
Blog
ICS Environments and Patch Management: What to Do If You Can’t Patch
By Anastasios Arampatzis on Mon, 10/02/2023
Image
The evolution of the cyber threat landscape highlights the need for organizations to strengthen their ability to identify, analyze, and evaluate cyber risks before they evolve into security incidents. Known unpatched vulnerabilities are often exploited by criminals to penetrate Industrial Control Systems (ICS) environments and...
Blog
How to Build an Effective ICS Security Program
By Michael Betti on Mon, 09/18/2023
Image
How to Build an Effective ICS Security Program
Of all the different areas of cybersecurity, not many are as important, or have as far-reaching consequences as industrial control systems (ICS) security. While most relevant organizations would agree that ICS security is a significant concern for their operations, it is easier...
Blog
OT Security: Risks, Challenges and Securing your Environment
By Katrina Thompson on Mon, 09/11/2023
Image
Before the revolution of Information Technology (IT), the world experienced the revolution of Operational Technology (OT).
Operational Technology is the combination of hardware and software that controls and operates the physical mechanisms of industry. OT systems play an important role in the water, manufacturing, power, and...
Blog
Former contractor accused of remotely accessing town's water treatment facility
By Graham Cluley on Fri, 07/14/2023
Image
A federal grand jury has indicted a former employee of a contractor operating a California town's wastewater treatment facility, alleging that he remotely turned off critical systems and could have endangered public health and safety.
53-year-old Rambler Gallor of Tracy, California, held a full-time position at a Massachusetts...
Guide
How Managed Services Can Help With Cybersecurity Compliance
Organizations are often overburdened with managing complex tools to handle their most important compliance responsibilities, and in many cases lack the internal headcount to manage those tools with highly-trained expertise. Managed services can solve your security staffing and resource challenges by arming your team with security expertise to maintain optimal compliance.
...
Blog
What (Still) Needs to be Done to Secure the U.S. Power Grid in 2023?
By Tripwire Guest Authors on Tue, 06/27/2023
Image
It’s no secret that the U.S. power grid is one of the main foundations of the nation’s economy, infrastructure, and daily way of life. Now that almost everything is digitized, it is hinging on it even more. We wouldn’t be able to use even most vending machines (not to mention cell towers or the internet) without a working...
Blog
The Future of Driverless Cars: Technology, Security and AI
By Bob Covello on Mon, 06/05/2023
Image
Back in 2015, we published an article about the apparent perils of driverless cars. At that time, the newness and novelty of sitting back and allowing a car to drive you to your destination created a source of criminal fascination for some, and a nightmare for others. It has been eight years since the original article was...
Blog
Distributed Energy Resources and Grid Security
By Tripwire Guest Authors on Tue, 04/04/2023
Image
As the United States government, the energy industry, and individual consumers work toward cleaner and more sustainable energy solutions, it is crucial to consider how new and advancing technologies affect, and are affected by, cybersecurity concerns. Increasing use of smart energy devices can be useful for consumers to have...