The Radiflow Cyber-Security Blog
Assessing OT network risk requires knowing both the impact and the Loss Event Frequency associated with a specific threat. “Guesstimating” would result in skewed findings; therefore, a data-driven approach, based on breach attack simulation is needed.
Gartner’s 2021 Hype Cycle Report recommends the use of key indicators for measuring the effects of OT cybersecurity systems, for Risk (KRIs), Controls (KCIs) and overall performance (KPIs). Radiflow’s CIARA risk assessment & management platform strictly adheres to this framework.
Effective industrial cybersecurity starts with devising an OT security strategy through a structured process of gathering information about the ICS network and its components, setting up a threat detection mechanism, and planning further threat mitigation measures.
Industry 4.0 has brought about many efficiencies in production and oversight, but at the same time exposed industrial (OT) networks to threats. In this post we review the fundamentals of protecting ICS automation networks.
Water utilities can improve their OT risk posture and optimize their industrial cybersecurity expenditure using IEC62443-compliant tools for ICS threat detection, network visibility and cyber-risk management.
How to Perform Non-Destructive OT Security Assessments with Digital Image-Based APT Breach Simulations
Radiflow’s digital image-based APT simulation method, used for assessing network risk the effectiveness of mitigation measures, is 100% non-destructive, making it the preferred tool for industrial risk assessment.
In this post we provide an overview of the MITRE ATT&CK cyber-threat knowledge base, implemented within CIARA’s APT analysis, and its twelve categories for possible industrial breach tactics.
Michael Langer, Radiflow’s Chief Products Officer, examines the root causes for the rise in cyberattacks on industrial (aka ICS/OT/SCADA) organizations, and provides guidelines for mitigating OT network risk.
Radiflow’s VP Business Development Rani Kehat explains the differences between asset- and adversary-based cyber-risk analyses, and how combining the two approaches helps to produce better risk scoring and optimize OT security expenditure.
Radiflow Chief Product Officer Michael Langer provides insight on the recent wave of global phishing attacks primarily focused on South Korean companies, and discusses the potential threat to industrial (OT) companies that may not be adequately protected.
IT and OT systems have traditionally kept separate to prevent cyber attacks from moving between the two networks. Industry 4.0 has created the imperative to converge the two realms. In this article we discuss the differences between IT and OT, focusing on the security challenges posed by convergence.
In the aftermath of the Colonial and JBS SA ransomware attacks: how to protect yourself while optimizing your ROI on Risk Reduction
We discuss the methods of optimizing your OT security through breach & attack simulation and risk assessment, to prioritize the most effective countermeasure mitigations.
In this overview of cybersecurity for SCADA systems, we cover: In this article we will cover what Is SCADA Cyber Security, the problems related, why SCADA security issues matter and how to perform a Security Risk Assessment for SCADA systems.
CIOs and business executives are beginning to see the advantages of integrating OT processes into their established security operations center (SOC), creating a new security approach known as an OT SOC.
Based on the amount paid as ransom to cyber-attackers, the magnitude of loss perceived by Colonial Pipeline obviously exceeds the $5M paid if we add up all the expenses involved in reaching Colonial’s recovery point objectives (RPO).