Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Security

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Report: ICS/OT Cybersecurity 2021 Year in Review

by DragosMay 10, 2022

Dragos is excited to present the fifth year of the annual Dragos Year In Review report on Industrial Control System (ICS)/ Operational Technology (OT) cyber threats, vulnerabilities, assessments, and incident response observations.

The ICS/ OT community has long suffered from more anecdotes on security than insights driven from data and real-world cases given the sensitivity of the subject. A lack of insights into the ICS/OT threat landscape and state of security prevent the community


Executive Summary: ICS/OT Cybersecurity 2021 Year in Review

by DragosMay 10, 2022

In 2021, the industrial community attracted high-profile attention. Major cybersecurity incidents struck industrial organizations in a range of sectors, with international headlines detailing everything from a compromise of a water treatment facility with intent to poison its community to a ransomware attack against a pipeline operator that disrupted gas supplies to the southeast United States.

These reports underscored the potential devastating outcomes a security breach of critical


Report: An Executive's Guide to Industrial Cybersecurity

by DragosMay 10, 2022

As enterprises invest heavily in digital transformation, industrial cybersecurity will increasingly serve as a critical enabler for safely and securely advancing business goals through technological innovation.

Advancing connectivity and digitalization of operational technology (OT) provides significant benefits to the business, including: Increased automation Improved process efficiency Better asset utilization Enhanced telemetry of machinery for business forecasting


Whitepaper: PIPEDREAM: Chernovite’s Emerging Malware Targeting Industrial Control Systems

by DragosMay 10, 2022

Threats to industrial infrastructure security are an extremely sensitive matter. Given the unique realities of industrial operations it is often harder for defenders to react than for adversaries to leverage public information. The more time the community has to implement mitigations before new malicious capabilities become public, the better the effects of any attempted attacks can be reduced.

PIPEDREAM is the seventh known Industrial Control Systems (ICS)-specific malware and fifth


Whitepaper: How Dragos Activity Groups Obtain Initial Access into Industrial Environments

by DragosMay 10, 2022

As the threat landscape continues to evolve with a perpetual influx of new network anomalies and Indicators of Compromise (IOC), prudent defenders must focus on more actionable elements of attack characteristics, such as Tactics, Techniques and Procedures (TTPs). One such example of this is the Initial Access Tactic.

Initial access is one of the most important adversarial tactics and may form the critical dependency on which further tactics rely, or conversely it may be the end goal


2022 Unit 42 Ransomware Threat Report

by Palo Alto Networks I Unit 42Mar 08, 2022

Ransomware groups are getting bolder and demanding higher ransoms.

In the 2022 Ransomware Threat Report, Unit 42 threat researchers and incident responders provide on-the-ground threat analysis of top ransomware groups, the range of cases handled by the team and an in-depth analysis of the newer tactics the groups are using to shame their victims into paying ransoms.

Download the report now to gain insights into: Established and emerging ransomware groups, including


Unit 42 Retainer

by Palo Alto Networks I Unit 42Mar 08, 2022

Having a retainer agreement in place with a trusted security advisor accelerates your ability to recover after an attack and resume normal business operations. The Unit 42 Retainer is custom-built to fit your organization's needs as you can choose to allocate your retainer hours to any of our offerings, including proactive cyber risk management services. Learn how you can put the world-class Unit 42 Incident Response team on speed dial.


IDC: The Critical Nature of Cloud Incident Readiness and Response

by Palo Alto Networks I Unit 42Mar 08, 2022

IDC recently conducted a research survey into the trends, challenges and benefits associated with IR and readiness.

Download this thought leadership white paper to gain insights into: Organizations' cybersecurity maturity level IR purchase methods, retainers and SLAs Top incident response provider capabilities The importance of telemetry, cloud IR and remediation This research data enables you to see how your organization compares by industry, company size, and more


Cloud Incident Response At a Glance

by Palo Alto Networks I Unit 42Mar 08, 2022

Cloud environments are inherently designed to be dynamic and scalable, which means even simple mistakes can lead to expensive, complicated incidents with outsized impact.

Unit 42 is doubling down on Cloud Incident Response practice to provide an optimized approach for each stage of the cloud incident lifecycle, resulting in faster recovery for impacted organizations.

Read the At a Glance to learn: Our new optimized approach to cloud IR process The cutting-edge


ESG: Investing in Incident Readiness

by Palo Alto Networks I Unit 42Mar 08, 2022

An incident response plan and retainer are critical to organizational security, but fewer than 50% of organizations have these procedures and SOPs in place.

ESG's e-book examines the incident readiness market, reveals how far organizations have come in IR planning and what requirements are still needed to combat data breach incidents and cybercriminals.

Download the e-book and get insight into: Drivers and efficacy of incident readiness services purchased Best


SUBTOPICS:

Dragos

Dragos is the industrial cybersecurity expert on a relentless mission to safeguard civilization. In a world of rising cybersecurity threats, Dragos protects the most critical infrastructure (those that provide us with the tenets of modern civilization) from increasingly capable adversaries. Devoted to codifying and sharing our in-depth industry knowledge of ICS/OT systems, Dragos arms industrial defenders around the world with the knowledge and tools to protect their systems as effectively and efficiently as possible.


Palo Alto Networks I Unit 42

Palo Alto Networks' Unit 42 brings together world-renowned threat researchers with an elite team of incident responders and security consultants to create an intelligence driven, response ready organization passionate about helping customers more proactively manage cyber risk. With a deeply rooted reputation for delivering industry-leading threat intelligence, Unit 42 has expanded its scope to provide state-of-the-art incident response and cyber risk management services. Our consultants serve as your trusted advisor to assess and test your security controls against the right threats, transform your security strategy with a threat-informed approach, and respond to incidents in record time.