Dragos Expands Defense Program for Small Utilities

Dragos has expanded its Dragos Community Defense Program to help small water, gas, and electric utilities to protect their networks from advanced threats.
Threat actors are increasingly targeting critical infrastructure networks, and small utilities are outgunned when it comes to defending themselves against these attacks.
The program, which originally launched in 2022, is now expanding to allow water, electric, or natural gas utilities with under $100 million in annual revenue in United States.
Utilities owned by a parent company whose total revenue does not exceed $100 million can also take part.
The program gives under-resourced utilities access to Dragos products for free, namely the Dragos Platform software, enrollment into the Neighborhood Keeper service, membership in OT-CERT, and access to Dragos Academy for training materials.
Dragos Platform software provides operational technology network visibility and monitoring, including asset visibility and inventory, threat detection, vulnerability management, and threat hunting.
OT-CERT, which has over 1,500 members in 60 countries, provides free how-to guides and demonstration videos, best practices, training, interactive working sessions, tabletop exercises, and webinars to help members build upon their industrial cybersecurity expertise and improve their OT security skills.


This Cyber News was published on www.darkreading.com. Publication date: Thu, 07 Dec 2023 14:50:06 +0000


Cyber News related to Dragos Expands Defense Program for Small Utilities

Dragos Expands ICS Platform with New Acquisition - "We grew pretty fast to become the de facto solution in the electric industry as the OT network visibility and segmentation analysis solution, which is extremely important in the case of compliance for the regulation in this industry," ...
8 months ago Darkreading.com
Dragos Offers Free OT Security Tools to Small Utilities - Cybersecurity vendor Dragos will provide free operational technology security software to small water, electric, and natural gas providers, an offer that comes as critical infrastructure comes under increasing attack. The program initially will be ...
1 year ago Securityboulevard.com
Dragos Expands Defense Program for Small Utilities - Dragos has expanded its Dragos Community Defense Program to help small water, gas, and electric utilities to protect their networks from advanced threats. Threat actors are increasingly targeting critical infrastructure networks, and small utilities ...
1 year ago Darkreading.com
Dragos Offering Free OT Cybersecurity Technology to Small US Utilities - Industrial cybersecurity firm Dragos on Wednesday announced that it's offering free operational technology security software and other resources to small electric, water and natural gas utilities in the United States through its Community Defense ...
1 year ago Securityweek.com
Volt Typhoon Hits Multiple Electric Utilities, Expands Cyber Activity - The portion of China's Volt Typhoon advanced persistent threat that focuses on infiltrating operational technology networks in critical infrastructure has already performed reconnaissance and enumeration of multiple US-based electric companies, while ...
1 year ago Darkreading.com Volt Typhoon
Dragos Launches Program to Provide Water, Electric Utilities With Free Cybersecurity Tools - This copy is for your personal, non-commercial use only. Distribution and use of this material are governed by our Subscriber Agreement and by copyright law. For non-personal use or to order multiple copies, please contact Dow Jones Reprints at ...
1 year ago Wsj.com
Cybersecurity Training for Small Businesses - The importance of cybersecurity training for small businesses cannot be overstated in today's increasingly digital world. In conclusion, cybersecurity training is essential for small businesses to protect themselves against cyber threats. There are ...
1 year ago Securityzap.com
States and Congress Wrestle With Cybersecurity After Iran Attacks Small Town Water Utilities - The tiny Aliquippa water authority in western Pennsylvania was perhaps the least-suspecting victim of an international cyberattack. Then it - along with several other water utilities - was struck by what federal authorities say are Iranian-backed ...
1 year ago Securityweek.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
ICS Ransomware Danger Rages Despite Fewer Attacks - Despite takedowns of top ransomware groups, those remaining threat actors have continued to develop new tricks, while maintaining their ability to capitalize on zero-day vulnerabilities, helping them do more damage to industrial control systems with ...
1 year ago Darkreading.com LockBit BianLian Akira Ragnar Locker Black Basta
Australian SMBs Faces Challenges in Cyber Security - The internet has turned into a challenge for small to midsize businesses based in Australia. As 60% of SMBs close following a breach, companies that are breached are likely to fail later. According to a recent report by ASIC, 'medium to large' ...
1 year ago Cysecurity.news
Integration of Cisco Secure Threat Defense Virtual with Megaport - Business critical data can originate from diverse sources ranging from multiple public clouds, private clouds, and internal servers to a remote employee's device. Securing each data entity individually is time consuming and challenging due to lack of ...
1 year ago Feedpress.me
A Heimdal MXDR Expert on Incident Response Best Practices and Myth Busting - I got to talk to Dragoș Roșioru, a seasoned MXDR expert, about incident response best practices and challenges. Get an in-depth understanding of the do's and don'ts in incident response as Dragoș explains how to avoid the most common mistakes ...
1 year ago Heimdalsecurity.com
Egress Security: Part of a Holistic, Multidirectional Security Strategy for Today's Multicloud World - According to Enterprise Strategy Group, more than half of production workloads will be running on public cloud infrastructure within the next two years, positioning cloud computing center-stage as the best practice for solving critical business ...
1 year ago Feedpress.me
Embracing offensive cybersecurity tactics for defense against dynamic threats - In this Help Net Security, Alexander Hagenah, Head of Cyber Controls at SIX, discusses the critical steps in creating effective offensive security operations and their impact on organizational security strategies. The first line of defense is often ...
1 year ago Helpnetsecurity.com
Building a Resilient Cyber Defense - CISO Strategies Unveiled - By bridging technical and business domains, modern security leaders create defense systems that adapt to evolving threats and changing business priorities. By combining strategic vision with tactical execution, security leaders can create defense ...
1 month ago Cybersecuritynews.com
Ambitious Training Initiative Taps Talents of Blind and Visually Impaired - When David Mayne first started looking for a job in cybersecurity, the recruiter at his first-choice company told him no. Mayne had already overcome tremendous hardship, losing his eye and his leg following a severe car accident, then finding a way ...
1 year ago Darkreading.com Inception
SpaceX Launched Military Satellites Designed to Track Hypersonic Missiles - Two prototype satellites for the Missile Defense Agency and four missile-tracking satellites for the US Space Force rode a SpaceX Falcon 9 rocket into orbit Wednesday from Florida's Space Coast. These satellites are part of a new generation of ...
1 year ago Wired.com Rocke
Verizon DBIR Report - Small Businesses Emerges as Prime Targets for Ransomware Attacks - For small businesses with limited resources, focusing on these fundamental security controls represents the most effective defense against the rising tide of ransomware attacks. The attack methodology reveals a sophisticated understanding of small ...
2 months ago Cybersecuritynews.com
Microsoft: Hackers target defense firms with new FalseFont malware - Microsoft says the APT33 Iranian cyber-espionage group is using recently discovered FalseFont backdoor malware to attack defense contractors worldwide. The DIB sector targeted in these attacks comprises over 100,000 defense companies and ...
1 year ago Bleepingcomputer.com APT3 APT33
Rugged Laptops: What Defense and First Responders Should Look For - Guest Editorial by Mike McMahon, President, Getac North America With law enforcement and first response data being targeted by bad actors and the growing threat of cyberspace being used as a theater of war, the rugged laptops used in the defense of ...
1 year ago Americansecuritytoday.com
Stopping Lateral Movement Means Identifying the Small Hops That Take Attackers Far - Today's attackers rarely conduct lateral movement manually. For attackers, lateral movement is an exercise in taking what they are given: They are not moving throughout the network according to some sort of preplanned map, but following open pathways ...
1 year ago Securityboulevard.com
ESET Small Business Security offers protection against online fraud, data theft and human error - ESET introduced ESET Small Business Security, which has been specifically designed to meet the cybersecurity needs of Small Office/Home Office business owners. According to the Small Business Administration, out of the 33.3 million small businesses ...
1 year ago Helpnetsecurity.com
CVE-2024-56786 - In the Linux kernel, the following vulnerability has been resolved: bpf: put bpf_link's program when link is safe to be deallocated In general, BPF link's underlying BPF program should be considered to be reachable through attach hook -> link -> prog ...
5 months ago Tenable.com