Watch Waterfall Security’s video for a brief explanation on how to achieve safe IT/OT integration and 100% protection from remote cyber threats with Unidirectional Security Gateways. Protect your industrial and OT network perimeter from remote cyber threats using the strongest cyber protection available. Click through to learn more.

The essence of today’s OT security problem is that the data-centric, IT-class protections are simply not enough for operational security and control system security needs. A cyber breach to physical processes and powerful tools can have disastrous consequences. Preventing misuse and protecting correct control is the goal of OT security. Read the new post by Courtney Schneider, Cyber Policy Research Manager at Waterfall Security

Over the last few decades, the clear path to securing operational technology has been difficult to forge as so much has come from the vast world of IT data protection, encryption and authentication. On the other hand, practitioners on the OT side of the digital network speak about the risks and unwanted consequences of this very technology to the physical systems they operate. The term SEC-OT - short for ‘Secure Operations Technology’ - is an attempt to combine all of the knowledge and best practices of secure industrial sites into one cohesive and disciplined approach. While the traditional IT approach is

FireEye reports that the Triton (aka Trisys) malware targeting safety instrumented systems has been discovered at another undisclosed target in the Middle East. As a result of investigating that intrusion, FireEye reports that the threat actors behind Triton are a government-sponsored Russian agency. Triton targets safety systems and is operated by interactive remote control. Human agents use software tools with the look and feel of Remote Desktop (RDP) to operate Triton and other attack tools during the intrusion. FireEye reports that, relative the first Triton attack, a new development is the extensive use of new, custom versions of popular attack tools.