關於 cookie 的說明

本網站使用瀏覽器紀錄 (Cookies) 來提供您最好的使用體驗,我們使用的 Cookie 也包括了第三方 Cookie。相關資訊請訪問我們的隱私權與 Cookie 政策。如果您選擇繼續瀏覽或關閉這個提示,便表示您已接受我們的網站使用條款。

搜尋結果Search Result

符合「OT」新聞搜尋結果, 共 2754 篇 ,以下為 1 - 24 篇 訂閱此列表,掌握最新動態
運用 AI 強化 OT 安全,抵禦新興網路威脅

作者: Palo Alto Networks市場行銷和網路安全副總裁 Navneet Singh 隨著 AI在全球企業中迅速普及,此轉變帶來巨大機會,同時也伴隨嚴重風險。根據麥肯錫最新的全球AI調查顯示,65%的受訪者表示其企業已經在日常營運中使用AI,此比例在短時間內大幅上升。這種對AI日益增長的依賴正在深入改變各行各業,尤其是在製造、能源等營運技術(OT)領域,AI已成為提高效率和自動化的關鍵推動力。然而,AI也成為網路犯罪份子的強大工具,因此這項技術也增加OT的安全風險。   雖然74%的OT攻擊源於IT,其中勒索團體是最主要的威脅,但AI正在增加這些威脅的複雜度、規模和速度。透過AI,網路犯罪份子能顯著縮短開發與部署勒索軟體的時間。在AI的幫助下,過去需要12小時才能完成的工作現在只需15分鐘。   例如最近的Black Basta勒索軟體的攻擊造成一家印刷版電路製造商1,700萬美元的損失。攻擊者僅用30分鐘透過網路釣魚郵件滲透至企業內部,隨後在90分鐘內提升權限、繪製網路地圖,並與其指揮和控制服務器建立通訊。在不到14小時的時間裡,他們就發動了一次完整的勒索軟體攻擊,竊取數TB的數據,甚至生成了多個客製化勒索軟體版本,而企業的安全系統在此期間仍未發現異常。   隨著AI和大量語言模型在加快數據準備和簡化惡意軟體開發方面的進步,此類攻擊從開始到結束的時間可能會進一步縮短至僅三個小時,此攻擊速度和複雜性的提升使OT領導者更加需要採取AI驅動的防禦措施,才能有效應對這些日益增長的威脅,並為支持AI的系統護航。   AI是OT安全的一把雙刃劍 雖然AI正在給OT環境帶來越來越大的威脅,但它同時也在改變各行各業的營運方式,提高工作流程的智慧化程度及效率,甚至開闢新的收入管道。企業可以透過AI等更智慧的技術進行預測性維護,企業可以釋放更大價值,並更有效地優化其流程,然而,這些技術進步也使 OT 組織迫切需要將先前孤立的資產連接到 IT 和雲端網路,從而擴大攻擊面並引入新的安全漏洞。   與此同時,攻擊者利用AI發起更快速、複雜且具有高度擴展能力的攻擊,Palo Alto Networks和ABI Research的調查突顯了這些風險,74%的OT領導者將AI驅動的攻擊視為首要威脅,而80%的OT領導者則認為AI對於防禦此類攻擊至關重要。有鑑於AI的兩面性,OT安全領導者需要利用AI驅動的防禦措施對抗攻擊者使用的AI。隨著網路威脅的不斷演變,AI賦能的安全營運將成為即時監測和緩解威脅的關鍵,所以這項強大技術在持續發展的OT安全環境中始終利大於弊。   針對OT系統的威脅不斷升級 數位轉型的興起推動了OT環境與IT網路的連接,在提高生產力的同時,也擴大了攻擊面,而攻擊者趁機使用複雜技術,在AI的輔助下滲透到OT系統中,與IT系統不同,OT環境負責重要基礎設施和營運,一旦受到攻擊就會產生嚴重後果,因此成為攻擊者眼中的高價值目標。   IT和OT面臨不同的安全挑戰 在 IT 環境中,網路威脅通常透過較成熟的工具和框架來偵測和應對數位攻擊。然而,OT 環境面臨獨特的挑戰。許多企業對於在 OT 安全中導入 AI 持謹慎態度,因為他們擔心在維持正常運行和安全性的同時,如何有效管理 AI 驅動的風險。傳統的OT系統在設計時以穩定性和連續運行為中心,因此更加注重避免可能影響安全或生產連續性的中斷,並且對安裝網路安全的適應性較差。此外,由於缺乏能與AI整合的專業OT安全工具,部署主動防禦措施變得更加複雜。   縮小這一差距的關鍵在於讓OT安全領導者能夠放心而順利地落實AI技術。因此,企業需要著力加強控管並明確AI使用的風險,才能充分實現AI在OT安全方面的優勢。   AI既是機會也是威脅 雖然AI增加了OT攻擊的複雜性,但同時也能夠大幅增強防禦。例如,AI可以透過處理大量OT數據加強異常檢測和支持即時威脅分析,使團隊能夠更快發現和應對潛在威脅。但勒索軟體等AI驅動的攻擊正越來越多利用OT系統中的漏洞,縮短從入侵到造成破壞的時間。由於攻擊者會不斷改進這些手段,OT領導者需要調整防禦策略,加入專為滿足複雜OT安全要求而設計的AI驅動工具。   透過平衡的AI策略打造韌性 為了應對AI在OT環境中的兩面性,企業需要採取包含嚴格風險評估和明確AI部署治理協議的平衡策略。此類安全策略應首先考慮在深入了解OT特定風險和挑戰的基礎上所開發的工具,以此獲得更高的可見性、進行持續監控,並形成不會對關鍵流程造成干擾的整體防禦方案。透過在明確的邊界和管控下導入 AI,OT 領導者可以提升其安全態勢,加強防禦能力,以應對複雜的 AI 驅動攻擊,同時有效管理數位轉型帶來的不斷演變的風險。     關於Palo Alto Networks Palo Alto Networks是全球網路安全領導者,致力於透過創新來超越網路威脅,讓企業能夠充滿信心地擁抱技術。我們在全球為成千上萬個來自不同領域的組織提供新世代網路安全支援。Palo Alto Networks 一流的網路安全平台及服務以領先產業的威脅情報為後盾,並由最先進的自動化技術而強化。透過提供產品協助實現零信任企業、回應安全事件,或是與世界級的生態圈合作確保更好的安全成果,我們始終致力於幫助實現「每一天都比前一天更安全」的目標,而這正是Palo Alto Networks 成為最佳網路安全合作夥伴的原因。

文章來源 : 盛思整合傳播顧問有限公司 發表時間 : 瀏覽次數 : 370 加入收藏 :
New TXOne Networks OT/ICS Cybersecurity Report Details Growing Range of Risks Facing Companies as Digital Transformation Unfolds Globally

Supply-chain vulnerabilities, aging infrastructure, patching difficulties and gaps in incident response demand urgent action to safeguard industrial operations, TXOne Networks report shows TAIPEI, March 5, 2025 /PRNewswire/ -- TXOne Networks, a leader in Cyber-Physical Systems (CPS) security, published its new annual report on operational technology (OT) cybersecurity, detailing risks such as supply-chain vulnerabilities, aging infrastructure, patching difficulties and gaps in incident response. The new report, which is publicly available for free download, reveals heightened concerns over digital vulnerabilities potentially introduced in deployment of industrial control systems (ICS) such as smart sensors, edge-computing devices, asset-tracking solutions and remote-monitoring tools.  TXOne 2024 OT/ICS Cybersecurity Report "How can organizations effectively secure these interconnected systems against cyber threats? This is the pressing challenge confronting Chief Information Security Officers (CISOs) worldwide," reads TXOne Networks' 2024 Annual OT/ICS Cybersecurity Report. "Traditionally, cybersecurity strategies have focused on safeguarding IT (information technology) systems and their digital assets. However, as industries undergo continuous digitalization, critical infrastructure is increasingly integrated into unified digital ecosystems, broadening the attack surface. The intrinsic differences between OT and IT systems often render IT-centric security measures inadequate when applied to OT environments. With OT systems now deeply interconnected, the shortcomings of conventional IT protections have become glaringly evident, particularly in light of the safety, availability, and reliability characteristics of these systems." The findings in the report are grounded in a large-scale survey conducted jointly by TXOne Networks and Frost & Sullivan, encompassing input from 150 C-suite executives from Asia, Europe, the Middle East and North America. The research covers multiple industrial sectors—automotive, food, oil and gas, pharmaceuticals and semiconductors, for example—each vital to the global economy and uniquely exposed to OT cybersecurity challenges. The report showed that 94% of surveyed organizations reported being at risk of OT cyber incidents in the past year, while 98% experienced IT incidents affecting their OT environments. While ransomware incidents decreased from 47% of respondents in 2023 to 28% in 2024, nation-state attackers on critical infrastructure were revealed to be a growing new concern. Advanced Persistent Threats (APTs), vulnerabilities in supply-chain software and advanced malware such as Fuxnet and FrostyGoop are among the diverse threats documented in 2024 Annual OT/ICS Cybersecurity Report. The TXOne Networks report goes on to illuminate key insights across a range of topics: Changing threat landscape of OT environments Prioritizing vulnerabilities and overcoming patching challenges Regulation and standardization trends Overcoming pitfalls and securing the future "As large enterprises strengthen their security posture, the focus of OT cybersecurity is expanding beyond visibility to include protection, advanced threat detection, and robust security governance," said Dr. Terence Liu, Chief Executive Officer (CEO) of TXOne Networks. "Asset discovery and vulnerability management are merely starting points. The persistent rise in OT cyberattacks, as highlighted in this year's report, underscores the urgent need for organizations—especially those without dedicated OT security practices—to take action. Security vendors must lead the way by bridging gaps through knowledge sharing and innovation. At TXOne Networks, we are committed to raising global OT security standards and shaping a more resilient future for industrial cybersecurity." Download TXOne Networks' 2024 Annual OT/ICS Cybersecurity Report. Follow TXOne Networks on Blog, Twitter, and LinkedIn. About TXOne Networks TXOne Networks offers cybersecurity solutions that ensure the reliability and safety of industrial control systems and operational technology environments. TXOne Networks works together with both leading manufacturers and critical infrastructure operators to develop practical, operations-friendly approaches to cyber defense. TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission-critical devices using a real-time, defense-in-depth approach. www.txone.com 

文章來源 : PR Newswire 美通社 發表時間 : 瀏覽次數 : 292 加入收藏 :
Palo Alto Networks 發布最新 OT 安全解決方案,應對工業營運面臨的網路安全威脅

全新功能由 Precision AI 驅動,專為保護 OT 遠端操作、降低關鍵 OT 資產風險,並將安全性延伸至嚴苛的工業環境而設計。 2024 年 11月 21日台北訊—隨著 IT 與 OT(營運技術)的整合和 OT 數位化轉型,工業自動化與控制系統迎來了創新與效率提升的新機會。然而,這些進步也擴大了潛在的攻擊面,使得 OT 環境的安全需求變得更為緊迫。全球網路安全領導者 Palo Alto Networks近日推出最新 OT 安全功能,包括業界唯一風險導向的完全整合虛擬修補解決方案,由 Precision AI™(精準 AI)提供支援,還有具備權限遠端存取功能的 Prisma® Access Browser,以及一系列專為嚴苛工業環境設計的機器學習強化型下一代防火牆(NGFW)。 根據 Palo Alto Networks 與 ABI Research 聯合發佈的《2024 年 OT 安全現狀》報告,70% 的工業企業在過去一年中遭遇過 OT 網路攻擊,其中近 25% 的企業因攻擊導致營運中斷,影響業務連續性。 Palo Alto Networks 網路安全業務高級副總裁兼總經理 Anand Oswal 表示:「OT 攻擊的頻率與複雜度日益提升,且多由 AI 驅動,這讓強大且專屬於 OT 的安全防護變得不可或缺。企業需要能夠提供即時可視性、全方位保護並簡化管理的安全解決方案。Palo Alto Networks 的 OT 安全解決方案由 Precision AI 提供支援,能一體化保護 OT 與 IT/OT 融合環境,幫助企業應對挑戰,確保關鍵基礎設施的安全。」 ARC Industrial Cybersecurity網路安全服務副總裁 Sid Snitkin 表示:「現今的OT(營運技術)環境日趨複雜且高度互聯,這使得它們更容易受到網路威脅。能夠部署像『引導式虛擬修補』這類AI驅動的工具,無疑是工業網路安全的重大突破。透過這種方式,企業能在不影響運作、不必承受傳統修補方法所需的高成本及中斷風險的情況下,及時解決漏洞問題。這種方法不僅能降低風險,更能全面提升OT基礎設施的韌性。」 Palo Alto Networks 的 OT 安全解決方案為各類 OT 環境提供全方位保護,包括網路、資產、遠端操作及 5G 網路,並提供具體的可視化和操作簡化功能,有助於提升企業效率。 新功能包含: ·       強化遠端營運的安全性與便利性:全新 Prisma Access Browser 提供的權限遠端存取功能,讓 OT 安全團隊在管理遠端營運時更具效率。此方案透過提供安全、即時的存取途徑,讓包括承包商與合作夥伴在內的所有授權使用者都能無縫連接關鍵 OT 系統,簡化部署並提升安全性。此外,它支援「即時存取」與工作流程的會話記錄,確保關鍵任務環境的安全同時,讓遠端存取的管理更為簡便。 ·       在不中斷營運的情況下快速修補 OT 漏洞:維護舊有 OT 資產的安全是一項挑戰,尤其是修補可能會影響正常營運時。工業 OT 安全解決方案中的『引導式虛擬修補』功能,讓安全團隊能夠在不影響營運的情況下迅速解決重大漏洞。Precision AI 支援的虛擬修補功能自動清點資產、評估風險並排定優先順序,讓難以進行修補的系統在常規修補週期之外獲得保護,不僅防止中斷,還延長資產壽命,確保關鍵營運作業的連續性和安全性。 ·       保護嚴苛環境中的遠端工業資產:工業運作有時需要在風雨交加或極端氣溫的條件下進行。強化型的 PA-400R 系列防火牆專為這類嚴苛且空間有限的環境設計,適合安裝於變電站和工廠車間等場所。安裝便利,即使在 DIN 軌上也能輕鬆部署,並提供具 5G 連接功能的型號,以確保遠端站點的持續連線。這款防火牆具備容錯轉移等功能,確保連線不中斷,讓關鍵基礎設施保持穩定,同時有效降低營運成本。     關於Palo Alto Networks Palo Alto Networks是全球網路安全領導者,致力於透過創新來超越網路威脅,讓企業能夠充滿信心地擁抱技術。我們在全球為成千上萬個來自不同領域的組織提供新世代網路安全支援。Palo Alto Networks 一流的網路安全平台及服務以領先產業的威脅情報為後盾,並由最先進的自動化技術而強化。透過提供產品協助實現零信任企業、回應安全事件,或是與世界級的生態圈合作確保更好的安全成果,我們始終致力於幫助實現「每一天都比前一天更安全」的目標,而這正是Palo Alto Networks 成為最佳網路安全合作夥伴的原因。   在Palo Alto Networks,我們承諾匯集最優秀的人才,為達成上述的使命而努力。所以我們也很自豪地成為網路安全領域的首選工作場所,並在近期獲選為新聞周刊「最受歡迎工作場所」(Newsweek Most Loved Workplaces, (2023, 2022, 2021))、在身心障礙平等指數上獲得100分(Disability Equality Index, (2023, 2022)),以及HRC 「最佳LGBTQ平等企業」(HRC Best Places for LGBTQ Equality, 2022)。如欲瞭解更多資訊,請造訪 http://www.paloaltonetworks.com/。 追蹤Twitter、LinkedIn、Facebook和Instagram瞭解Palo Alto Networks最新資訊。

文章來源 : 盛思整合傳播顧問有限公司 發表時間 : 瀏覽次數 : 4735 加入收藏 :
IIJ Introduces Safous Industrial SRA To Elevate Secure Remote Access and Privileged Access Management for OT Environments

TOKYO, Sept. 26, 2024 /PRNewswire/ -- Internet Initiative Japan Inc. (IIJ) (TSE Prime: 3774), a leader in Zero Trust security solutions, has announced the launch of Safous Industrial SRA, a cutting-edge solution designed to secure both remote and privileged access for Operational Technology (OT) environments. Built with Secure Remote Access (SRA) and Remote Privileged Access Management (RPAM) principles, this new offering addresses the growing need for secure, seamless access to critical industrial systems. As cyber threats increasingly target OT systems—particularly in manufacturing, energy, and critical infrastructure—ensuring secure, managed access has become vital. Traditional VPNs pose significant vulnerabilities such as compromised credentials, making it easier for attackers to penetrate OT systems. Safous Industrial SRA is designed to mitigate these risks by offering a comprehensive, Zero Trust-based solution that combines remote access with stringent privileged access management controls. Safous Industrial SRA, provided by IIJ, ensures organizations can secure remote access while maintaining the highest level of control over privileged accounts within air-gapped OT environments. The solution offers a dedicated internal Point of Presence (POP) at each facility, completely isolated from the public internet, giving organizations the flexibility to manage privileged access securely without exposing critical systems to external threats. "With the increasing complexity of OT environments and the rising frequency of cyberattacks, organizations must prioritize both remote access and privileged access management," said Miki Tanaka, Global Business Director at IIJ. "Safous Industrial SRA delivers a Zero Trust solution that not only enhances security but simplifies management of both remote and privileged access to critical infrastructure." Safous Industrial SRA integrates powerful Remote Privileged Access Management features, allowing organizations to control who can access OT systems, monitor privileged sessions, and ensure that only authorized personnel can perform sensitive operations. The platform's fine-grained authorization controls, secure password management, and session logging provide robust security for even the most sensitive OT systems. Key Benefits of Safous Industrial SRA: VPN-less Secure Remote Access and Privileged Access Management: Combines secure, agentless remote access with fine-grained control over privileged accounts, reducing risks associated with traditional VPNs. Granular access control: Enables precise management of both user and privileged access, ensuring that only authorized personnel can perform critical operations. Identity Authentication and MFA for legacy systems: Offers robust security for legacy OT systems that cannot support software installations, using an add-on approach for ID authentication and multi-factor authentication (MFA). Cost efficiency: Streamlines remote access by transitioning from closed maintenance networks to a Zero Trust-based solution, cutting operational costs and simplifying access management. Agentless deployment: Ensures fast, smooth deployment without need for extensive user training or additional software, making it ideal for facilities without dedicated security teams. With Safous Industrial SRA, organizations can safeguard their OT environments while maintaining full control over privileged accounts, ensuring operational continuity without compromising security. Visit https://www.safous.com/ to learn more. See Safous in Action at Cybersecurity World Asia 2024 Safous by IIJ will be exhibiting at Cybersecurity World Asia 2024 in Singapore. Attendees can experience a live demonstration of the Safous Industrial SRA solution at Booth E123 during the event, which will take place at Marina Bay Sands Expo and Convention Centre on 9-10 October 2024. Cybersecurity World Asia is a premier event bringing together cybersecurity experts, professionals, and solution providers to showcase the latest in cybersecurity technologies and innovations. The event provides a valuable platform for organizations to explore cutting-edge solutions that address today's most pressing security challenges. Visit the Safous booth for a hands-on demonstration and to learn how Safous Industrial SRA can protect your OT environments with Zero Trust security and Privileged Access Management. About IIJ Founded in 1992, IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers. IIJ and its group companies provide total network solutions that mainly cater to high-end corporate customers. IIJ's services include high-quality Internet connectivity services, systems integration, cloud computing services, security services and mobile services. Moreover, IIJ has built one of the largest Internet backbone networks in Japan that is connected to the United States, the United Kingdom and Asia. IIJ was listed on the Prime Market of the Tokyo Stock Exchange in 2022. For more information about IIJ,visit the official website: https://www.iij.ad.jp/en/. The statements within this release contain forward-looking statements about future plans that involve risk and uncertainty. These statements may differ materially from actual future events or results. For inquiries, contact:IIJ Corporate CommunicationsTel: +81-3-5205-6310 Email: press@iij.ad.jp https://www.iij.ad.jp/en/ *All company, product, and service names used in this press release are the trademarks or registered trademarks of their respective owners.

文章來源 : PR Newswire 美通社 發表時間 : 瀏覽次數 : 482 加入收藏 :
「資安防禦 即刻啟動」9/25 IT x CT x OT全方位資安聯防生態系論壇 高雄登場

隨著全球資安威脅和網路攻擊事件不斷攀升,傳統工業網路的安全防護正面臨嚴峻考驗。全面啟動資安防禦、強化數位韌性已刻不容緩。為此,昇頻攜手飛泓科技、眾至資訊與立端科技將於2024年9月25日(三)在高雄翰品酒店舉辦「IT x CT x OT Cybersecurity全方位資安聯防生態系論壇」,聚焦最新防禦策略、技術趨勢和案例展示,幫助企業建立強韌的資安防線,有效應對未來的資安風險。 全面深化零信任資安防護 本次論壇從IT、CT到OT的全方位資安防禦策略,將著重「建構以安全連網為核心的物聯網新佈局」,探討在智慧聯網時代下,設計強固安全的工業物聯網架構,保障內外網的互聯安全,因應佈署工廠資安防護的同時,也確保生產不中斷。以及在「IoT萬物聯網的時代,內網控管的防禦之道」,運用先進的網路資安工具,快速檢測和應對非法設備接入,並進行風險評估以防範潛在的安全威脅。同時強調「從單點防護邁向全方位點線面安全設備布建」的重要性,透過多層次的安全設備部署,將安全防護措施延伸至企業網路的各個角落,實現多層次的資安防護,提升整體網路安全性。 邊緣運算與資安的標竿應用 當前AI邊緣運算與應用普及化,其隱藏的資安風險也是各方關注的焦點,針對此議題將分享「在邊緣設備上增強IT/OT網路安全」的成功案例,深入了解如何在實踐中發揮效益,有效提升資安防護水平。這些技術的應用,不僅能提升系統的即時反應能力,還能進一步加強企業整體的資安防護。本次活動將透過面對面交流,現場實境展示多元且完整的軟硬體資安防護解決方案,讓參與者親身體驗這些前沿技術的實際應用,提升企業在數位轉型的過程中構築穩健安全的資安防護屏障。 引領企業先進掌握資安未來 昇頻與生態圈合作夥伴秉持精益求精的專業精神,致力於為企業打造最堅實的資安防線,助力企業在瞬息萬變的數位時代中實現資安防禦量能。此次論壇不僅是獲得資安趨勢發展的最佳機會,更是匯聚企業領袖、資安專家、研發人員與採購決策者深入交流的絕佳平台。 我們誠摯邀請各界企業先進踴躍參加,共同探索資安防禦新對策! 活動名稱:IT x CT x OT Cybersecurity全方位資安聯防生態系論壇 活動日期:2024年9月25日(三),下午14:00-16:30(13:30開始報到) 活動地點:高雄翰品酒店 翰品廳(高雄市鹽埕區大仁路43號B1) 主辦單位:昇頻股份有限公司 協辦單位:飛泓科技、眾至資訊、立端科技 線上報名:https://www.accupass.com/go/24_kao_Event

文章來源 : 昇頻股份有限公司 發表時間 : 瀏覽次數 : 3913 加入收藏 :
MicroSec Announces the Launch of CyberAssessor for OT/ICS: The World's First AI-Based Cybersecurity Assessment Platform for IEC 62443

SINGAPORE, Sept. 9, 2024 /PRNewswire/ -- MicroSec, a global leader in Operational Technology (OT) and Industrial Control Systems (ICS) cybersecurity, announces the launch of CyberAssessor for OT/ICS, the world's first AI-based automated cybersecurity assessment platform specifically designed for performing IEC 62443 assessments. This platform automates the assessment process and enhances compliance evaluation accuracy across sites and down to the device level, including third-party equipment, hardware, and software. It provides a comprehensive summary through a "single pane" dashboard and generates an automatic report detailing the organization's risk level, compliance score, and recommendations. After a successful beta trial, MicroSec is now launching CyberAssessor for OT/ICS globally. CyberAssessor for OT/ICS addresses the ISA/IEC 62443 standard, an internationally recognized framework for securing industrial automation and control systems (IACS) and widely adopted across industries such as manufacturing, energy, utilities, and critical infrastructure. The CyberAssessor for OT/ICS helps organizations achieve compliance across multiple sites, individual plants, and at both the infrastructure and device levels by assessing against standards such as IEC 62443 (including parts 2-4, 3-2, 3-3, 4-2), along with other industrial cybersecurity frameworks like ISO 27400, Singapore's TR64, IACS E26/E27, CIS benchmarks, and regional frameworks. For asset owners and plant managers, two main challenges arise when conducting a cyber risk assessment. The first is how to quickly and accurately assess cyber risks that can scale from individual ICS equipment, regardless of make or model, to the entire site level. The second challenge is how to quantify and resolve areas of non-compliance, and then apply consistent standards across multiple sites and devices. MicroSec's CyberAssessor for OT/ICS addresses these challenges by offering a non-invasive approach that requires minimal to no integration, simplifying the process of evaluating and complying with IEC 62443. It automatically assesses cyber risks across sites or individual equipment, reducing the need for manual input, minimizing human error, and enhancing visibility by identifying both known and unknown systems and devices through zone mapping. CyberAssessor conducts cyber risk assessments using automated digital questionnaires, instant network captures, and real-time network traffic visibility. These assessments can be performed at both the site and device levels, from Level 0 to Level 5 of the Purdue Model, as well as across multiple sites. Upon completion of an assessment, asset owners and plant managers receive a compliance score for IEC 62443, which establishes a baseline and is benchmarked against similar organizations in their industry. All identified areas of non-compliance, along with cyber risks, threats, and vulnerabilities, are tracked via compliance dashboards across zones, segments, and multi-sites. Management also receives a detailed report with the compliance score, risks, and recommendations for achieving compliance. These recommendations are automatically generated based on the specific areas of non-compliance and the end user's security level targets. Since the process is automated, the entire assessment, scoring, and reporting can be completed in hours, rather than the days or weeks typically required by traditional assessments. Additionally, to ensure business continuity and incident response planning, MicroSec's CyberAssessor overcomes knowledge loss from staff turnover, outdated device information, and limited cybersecurity expertise. It does this by storing information, maintaining assessment histories, and tracking performance, all of which are managed within the platform. Dr. Vishram Mishra, CEO of MicroSec, commented on this remarkable achievement: "This innovative solution marks a significant milestone in our mission to safeguard critical infrastructure and industrial systems. By offering a comprehensive and automated approach to compliance with this essential standard, we are empowering organizations to strengthen their security posture and defend against the evolving cyber threats targeting OT and IoT environments. Our commitment to excellence in cybersecurity continues to distinguish us as a global leader in the field." CyberAssessor is part of the broader MicroSec MicroIDS platform, which enables continuous assessment and monitoring of new threats and vulnerabilities. When a threat or vulnerability is detected, it is isolated, triggering an immediate response that can be automated or customized based on user preferences. MicroIDS is the only platform today that combines cyber risk assessments with real-time threat and vulnerability detection, isolation, and response for OT/ICS environments, whether for multi-site operations or individual equipment. CyberAssessor for OT/ICS marks a significant advancement in industrial cybersecurity for critical infrastructure, utilities, energy, and manufacturing. It leverages the company's deep expertise in asset detection, threat management, standards compliance, and AI. The platform bridges the gap between regulatory compliance and threat detection and response, while also safeguarding against future threats. MicroSec is actively collaborating with global and regional partners, including certification bodies, consultants, and solution providers, to build a strategic OT cybersecurity ecosystem. The company aims to drive innovation, achieve standardization, and ensure compliance across the industry. Those interested in partnering, learning more about the solutions, or exploring potential opportunities are encouraged to visit www.microsec.io or contact the media relations team at info@usec.io for further discussions.

文章來源 : PR Newswire 美通社 發表時間 : 瀏覽次數 : 284 加入收藏 :
2025 年 3 月 27 日 (星期四) 農曆二月廿八日
首 頁 我的收藏 搜 尋 新聞發佈