Dragos Offers Free OT Security Tools to Small Utilities

Cybersecurity vendor Dragos will provide free operational technology security software to small water, electric, and natural gas providers, an offer that comes as critical infrastructure comes under increasing attack.
The program initially will be available in the United States and will include such tools as Dragos' eponymous OT security platform and Neighborhood Keeper, a collective-defense information-sharing program run with the U.S. Department of Energy to make threat intelligence available to all users of the Dragos Platform.
The new offering is coming through Dragos' Community Defense Program, an initiative launched last year as a trial program and that is now expanding.
The goal behind the program is to help smaller utilities to protect themselves against cyberthreats.
Along with the Dragos Platform and Neighborhood Keeper, the Community Defense Program includes access to Dragos Academy, an on-demand training and education program for OT cybersecurity and the Dragos Platform, as well as membership in OT-CERT, a program the vendor launched last year to deliver OT-specific cybersecurity resources to industrial and OT operators.
Those resources include how-to guides, demonstration videos, and best practices.
The OT-CERT program has more 1,500 members from more than 60 countries, according to Dragos, a seven-year-old company in September raised $74 million in Series D funding, growing the total amount raised to $440 million.
OT cybersecurity is a fast-growing market, with Allied Market Research analysts saying it will grow from $15.2 billion last year to $84.2 billion by 2032.
Driving the growth is the growing number of industrial control systems are being connected to the internet and other networks, the rising adoption of OT security solutions, and expanding government critical infrastructure security initiatives.
Critical infrastructure operations are becoming a popular target of both financially driven and state-sponsored adversaries that see attacks on such systems as ways to squeeze money from victims or disrupt vital infrastructure operations in a rival country.
High-profile attacks in recent years include the 2021 attack on Colonial Pipeline by the ransomware-as-a-service group DarkSide.
The company supplies almost half the fuel in the U.S. East Coast and the attack led to shortages in the region.
That same year, JBS Foods, a global meat processor, was attacked by ransomware group REvil.
More recently, the U.S. Cybersecurity and Infrastructure Security Agency warned that an Iran-backed group called Cyber Av3ngers were targeting water and wastewater systems with attacks that exploited a vulnerability in programmable logic controls from Unitronics that are used to monitor water treatment processes.
The warning came after attackers seized control of a municipal water operation in Pennsylvania, forcing operators to take systems offline and shift to manual operations.
Protecting critical infrastructure is a key part of the White House's larger federal cybersecurity initiatives.
The government includes 16 sectors in that designation, including chemical, communications, energy, healthcare, agriculture, and transportation.
Government agencies also have rolled out a range of programs aimed at protecting critical infrastructure, from the Department of Homeland Security's National Infrastructure Protection Plan to CISA's Information Sharing and Analysis Organization.
CISA last month launched a pilot program that essentially will let commercial critical infrastructure entities use the agency as a managed services provider, tapping into shared services, support, and security expertise that federal civilian organizations have been offered for several years.


This Cyber News was published on securityboulevard.com. Publication date: Thu, 07 Dec 2023 15:13:05 +0000


Cyber News related to Dragos Offers Free OT Security Tools to Small Utilities

9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
7 months ago Esecurityplanet.com
Dragos Offers Free OT Security Tools to Small Utilities - Cybersecurity vendor Dragos will provide free operational technology security software to small water, electric, and natural gas providers, an offer that comes as critical infrastructure comes under increasing attack. The program initially will be ...
7 months ago Securityboulevard.com
Dragos Expands Defense Program for Small Utilities - Dragos has expanded its Dragos Community Defense Program to help small water, gas, and electric utilities to protect their networks from advanced threats. Threat actors are increasingly targeting critical infrastructure networks, and small utilities ...
7 months ago Darkreading.com
Dragos Offering Free OT Cybersecurity Technology to Small US Utilities - Industrial cybersecurity firm Dragos on Wednesday announced that it's offering free operational technology security software and other resources to small electric, water and natural gas utilities in the United States through its Community Defense ...
7 months ago Securityweek.com
8 Tips on Leveraging AI Tools Without Compromising Security - Forecasts like the Nielsen Norman Group estimating that AI tools may improve an employee's productivity by 66% have companies everywhere wanting to leverage these tools immediately. How can companies employ these powerful AI/ML tools without ...
7 months ago Darkreading.com
Dragos Launches Program to Provide Water, Electric Utilities With Free Cybersecurity Tools - This copy is for your personal, non-commercial use only. Distribution and use of this material are governed by our Subscriber Agreement and by copyright law. For non-personal use or to order multiple copies, please contact Dow Jones Reprints at ...
7 months ago Wsj.com
Volt Typhoon Hits Multiple Electric Utilities, Expands Cyber Activity - The portion of China's Volt Typhoon advanced persistent threat that focuses on infiltrating operational technology networks in critical infrastructure has already performed reconnaissance and enumeration of multiple US-based electric companies, while ...
4 months ago Darkreading.com
Cybersecurity Training for Small Businesses - The importance of cybersecurity training for small businesses cannot be overstated in today's increasingly digital world. In conclusion, cybersecurity training is essential for small businesses to protect themselves against cyber threats. There are ...
4 months ago Securityzap.com
7 Best Vulnerability Scanning Tools & Software - Vulnerability scanning tools scan assets to identify missing patches, misconfigurations, exposed application vulnerabilities, and other security issues to be remediated. To help you select the best fitting vulnerability scanning solution, we've ...
5 months ago Esecurityplanet.com
States and Congress Wrestle With Cybersecurity After Iran Attacks Small Town Water Utilities - The tiny Aliquippa water authority in western Pennsylvania was perhaps the least-suspecting victim of an international cyberattack. Then it - along with several other water utilities - was struck by what federal authorities say are Iranian-backed ...
6 months ago Securityweek.com
Best Network Security Providers for Healthcare - The exponential growth of Electronic Health records, telemedicine, and interconnected medical devices creates a complex healthcare ecosystem demanding robust network security. Network security providers specializing in healthcare offer a ...
1 month ago Cybersecuritynews.com
ICS Ransomware Danger Rages Despite Fewer Attacks - Despite takedowns of top ransomware groups, those remaining threat actors have continued to develop new tricks, while maintaining their ability to capitalize on zero-day vulnerabilities, helping them do more damage to industrial control systems with ...
5 months ago Darkreading.com
4 types of cloud security tools organizations need in 2024 - By now, organizations know which on-premises security tools they need, but when it comes to securing the cloud, they don't always understand which cloud security tools to implement. While many traditional on-premises tools and controls work in the ...
2 months ago Techtarget.com
What is App Security? SAST, DAST, IAST, and RASP. - Effective application security relies on well-defined processes and a diverse array of specialized tools to provide protection against unauthorized access and attacks. Security testing is a critical part of an application security strategy and should ...
6 months ago Feeds.dzone.com
5 Free Online Brand Protection Software Tools: Pros and Cons - Free or open-source software does exist that can help organizations look for and investigate deceptive websites spoofing their brand. On the other hand, few free tools exist that allow one to take action against online brand impersonation attacks. To ...
5 months ago Securityboulevard.com
Wazuh: Building robust cybersecurity architecture with open source tools - Building a cybersecurity architecture requires organizations to leverage several security tools to provide multi-layer security in an ever-changing threat landscape. Leveraging open source tools and solutions to build a cybersecurity architecture ...
5 months ago Bleepingcomputer.com
Wazuh: Building robust cybersecurity architecture with open source tools - Building a cybersecurity architecture requires organizations to leverage several security tools to provide multi-layer security in an ever-changing threat landscape. Leveraging open source tools and solutions to build a cybersecurity architecture ...
5 months ago Bleepingcomputer.com
Role of Wazuh in building a robust cybersecurity architecture - Building a cybersecurity architecture often requires organizations to integrate various security solutions and tools to provide multi-layer security in an ever-changing threat landscape. The cost associated with implementing some proprietary security ...
5 months ago Bleepingcomputer.com
Mastering SDLC Security: Best Practices, DevSecOps, and Threat Modeling - In the ever-evolving landscape of software development, it's become absolutely paramount to ensure robust security measures throughout the Software Development Lifecycle. Each of these have illuminated different vulnerabilities that can be exploited ...
6 months ago Securityboulevard.com
The Dangers of Remote Management & Monitoring Tools for Cybersecurity - Remote monitoring and management (RMM) tools are used by business organizations to manage and monitor their enterprise IT infrastructure from a central location. However, the increasing sophistication of hackers and cybercriminals has caused both ...
1 year ago Csoonline.com
Australian SMBs Faces Challenges in Cyber Security - The internet has turned into a challenge for small to midsize businesses based in Australia. As 60% of SMBs close following a breach, companies that are breached are likely to fail later. According to a recent report by ASIC, 'medium to large' ...
7 months ago Cysecurity.news
What Is Security Service Edge: All You Need to Know - Security service edge is a security technology that secures access to assets outside of the corporate network. Security service edge introduces a control that connects to remote users and assets before they connect to each other. All SSE tools borrow ...
1 month ago Esecurityplanet.com
The 9 Most Essential API Security Tools to Protect Against Cyber Threats - Understanding the importance of API security is crucial as technological advancements across various industries continue to make our lives easier. Through APIs connecting different systems and services together, automation is becoming increasingly ...
1 year ago Csoonline.com
CI/CD Pipeline Security: Best Practices Beyond Build and Deploy - These pipelines represent an incredible security risk to organizations, and the consequences can be severe. A seemingly harmless code change that makes its way through a compromised pipeline could lead to security breaches, system compromise, and ...
5 months ago Securityboulevard.com
A Heimdal MXDR Expert on Incident Response Best Practices and Myth Busting - I got to talk to Dragoș Roșioru, a seasoned MXDR expert, about incident response best practices and challenges. Get an in-depth understanding of the do's and don'ts in incident response as Dragoș explains how to avoid the most common mistakes ...
6 months ago Heimdalsecurity.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)