sb-au logo
Story image

FireEye says industrial cybersecurity is far too vulnerable - and the stakes are high

16 Aug 2016

FireEye has released a report that shines light on how industrial and utilities providers manage the security of their own industrial control systems (ICS) assets, and the effects can put an entire country at stake.

ICS assets encompass everything from electricity grids, water supplies and powerlines. The industry hires about 137,000 people across Australia, and has millions of customers.

FireEye examined security staff in utilities and other industries worldwide. The report showed that most are unaware of their assets and their vulnerabilities over the past fifteen years, as documented by company research.

The vulnerabilities can affect everything from sensor operation, controller programming, software and networking equipment used for automation.

The report also found that there were 1552 vulnerabilities in April 2016, compared to just 149 between January 2000 and December 2010.

Of these 1552 vulnerabilities found this year, 516 of them didn't even have a vendor fix, either because they are unpatched or the technology is so old that they are unpatchable.

What's more, at least five of these vulnerabilities have been exploited by nation-state cyberattackers since 2009. FireEye states that ignoring the warning signs leaves industrial environments exposed to threats.

Story image
Endace and Palo Alto Networks launch integration to empower security teams
“The combination of Cortex XSOAR’s powerful orchestration and automation capabilities with the rich network history recorded by the EndaceProbe Analytics Platform gives security operations access to the conclusive forensic evidence they need to respond quickly and accurately to threats.” More
Link image
How to deploy containerised apps in your cloud infrastructure
Move your business into the future - take advantage of a free consultation to pinpoint how container-based applications can propel your cloud infrastructure to new heights.More
Story image
Cybercriminals seeking greater anonymity online, Trend Micro states
Cybercriminals have switched to ecommerce platforms and communication using Discord for greater anonymity, according to new research from Trend Micro. More
Download image
Dialing in from home: Why VPNs are essential for your corporate network
Right now, how many employees, partners, or contractors are working from home and logging into your network?More
Link image
OSS Group helps businesses use IT Automation to unify people & processes
if it exists in IT there is usually a way to automate it. Whether you're a director or systems engineer, those that understand automation can achieve a more streamlined and secure business.More
Download image
Revealed: How to make authentication simple again
It's absolutely necessary for a healthy security landscape, but authentication has become convoluted and bogged-down. Simplify and secure your processes with this tool.More