A Google search for "cybersecurity" returns 129 million results. A sizable amount of that content addresses the sub-type that we call automation cybersecurity, an umbrella term that covers—non-exclusively—industrial cybersecurity, OT cybersecurity, ICS cybersecurity, IoT cybersecurity, and the cybersecurity of building automation systems.
Automation cybersecurity is still somewhat more niche than IT cybersecurity. Like most niche topics, however, there are thousands of sources that deal with it in depth, and the quality varies. Unless reading is your only job, you may not be inclined to keep up with new developments minute-by-minute.
So we're going to help cut through the noise this month. We looked for relevant articles published in July 2020 that you might find newsworthy, useful, or interesting. Here's a sample of current news and thought leadership that affects the world of automation cybersecurity right now. Let us know what you think in the comments.
Security researchers obtained two recent samples of the EKANS ransomware, uncovering new ways that cyberattackers are threatening industrial control systems (ICS). As the article states, "malware designed to attack industrial control systems continues to be lucrative for threat actors."
Both EKANS samples seem to have been designed to carefully select their target companies before encrypting files and showing the victim a ransom note. The most recent sample, obtained in June, is also capable of turning off host firewalls—potentially causing massive disruption in an industrial setting.
Cyberattacks on operational technology (OT) are increasing as more manufacturing plants begin to actualize their digital transformation. This article offers a few practical tips on maintaining OT cybersecurity for industrial businesses, emphasizing that training all employees to be "cyber-aware" is essential.
This article appeared in Secure Futures Magazine, an online offering from the cybersecurity firm Kaspersky Labs.
As the world adjusts to more remote work, we've heard about the simultaneous rise in phishing emails, many which play on COVID-19 fears. This article states that brute-force attacks have increased, as well. Many of these attacks attempt to exploit Windows' remote desktop protocol (RDP).
Ransomware gangs have used attacks on RDP as a common tactic over the last few years. A study conducted more recently, however, found the highest concentrations of targeted IP addresses in Russia, Germany, and Japan.
This article examines the payoffs and hidden costs of IT/OT convergence in security for smart cities. It urges traditional security integrators to embrace the cybersecurity learning curve and to take it seriously.
"Integrators willing to make the investment to train and develop technicians to become proficient in the converged environment as well as IT/IoT/OT infrastructure awareness will have the potential to reap the rewards when it comes to the Smart Cities vertical," the article says.
A recent report from a U.K.-based cybersecurity foundation says that global critical infrastructure is not adopting new technology fast enough to match the pace of emerging cyber threats to IIoT. The article suggests that many current capabilities will not scale or have not been thoroughly tested. It also notes the different perspectives of those responsible for industry risk management, from executives to regulators to cybersecurity teams, and suggests that everyone needs to get more savvy about cyber risk.
Interested in reading more articles like this? Subscribe to the ISAGCA blog and receive weekly emails with links to the latest thought leadership, tips, research, and other insights from automation cybersecurity leaders.