Critical Infrastructure Operators are like the man in the middle caught between a continuing assault from hackers on systems and management’s reluctance to implement new security technologies for fear of downtime and incompatibility. Edgard Capdevielle, CEO at Nozomi Networks commented below.
“The challenges of protecting ICS are real. Attacks targeting them are on the rise and there are legitimate concerns from asset operators that tackling security will impact uptime of critical systems. Fortunately, we have entered a new era of ICS cybersecurity protection. Amid escalating attacks, security innovations have emerged that can protect ICS environments completely passively, with no impact on operational availability. Using artificial intelligence and machine learning these technologies provide both real-time monitoring and anomaly detection. They combine behavior-based and signature-based detection and, alert operators immediately of possible attacks or operator errors. As a result, immediate action can be taken to minimize or avoid operational impact. The tide is changing in-favor of the ICS and SCADA defenders who turn to new, passive, ICS cybersecurity innovations to combat cyber-attacks on their critical operational systems.”
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.