Archive

All entries

The UK's National Cyber Security Centre (NCSC) reacts to growing cloud implementations for operational technology, SCADA, and industrial control systems. The shift to cloud computing has caused the NCSC to be concerned that organizations aren't properly managing the new connectivity, including security boundaries and access control mechanisms.
Risk Management
Cyber Resilience
Operational Technology

UK NCSC Urges OT/ICS Operators to Secure Cloud Migrations

George V. Hulme
The U.K.'s enhanced Cyber Assessment Framework is designed to help critical infrastructure organizations comprehensively assess and improve their ability to defend against, and respond to, cyberattacks.
Cyber Resilience
Operational Technology
Operational Resilience

UK Critical Infrastructure Sectors Brace for Enhanced Cyber Assessment Framework

George V. Hulme
Researcher Ryan Pickren explains a new web-based attack against programmable logic controllers (PLCs) that uses malicious JavaScript to attack the front end of an embedded web server prevalent in modern PLCs.
Operational Technology
Vulnerability Management
Internet of Things

Nexus Podcast: Ryan Pickren on New Web-Based PLC Malware Research

Michael Mimoso
Expert Dan Ricci explains how IT security and operational technology engineers and asset operators must collaborate to properly address risk within industrial environments.
Operational Technology
Risk Management
Operational Resilience

Three Ways to Foster Collaboration, Understanding Between IT, OT Security, Part 2

Dan Ricci
The Volt Typhoon takedown highlights the challenges the world faces in defending against such threats and the private industry/government collaboration that's necessary to succeed.
Operational Technology
Cyber Resilience
Risk Management

Volt Typhoon Takedown Highlights Critical Infrastructure Security Complexities

George V. Hulme
Understanding the nuances of OT cybersecurity vulnerabilities becomes imperative for IT cybersecurity teams to develop comprehensive defense strategies that safeguard both IT and OT environments.
Operational Technology
Operational Resilience
Vulnerability Management
Risk Management

What IT Cybersecurity Teams Need to Know about OT Vulnerabilities (Part 1)

Dan Ricci
Technical debt in OT leads to increased operations costs as teams fight to maintain outdated systems, and security teams struggle to keep those same systems secure, often through compensating controls.
Operational Technology

Getting Strategic Against Technical Debt in OT

George V. Hulme
Team82’s Noam Moshe discusses state actor targeting of OT, why it’s so challenging to develop ransomware for OT and industrial control systems, and the mitigation strategies available to defenders of cyber-physical systems.
Internet of Things
Operational Technology
Vulnerability Management

Nexus Podcast: Team82 Answers More of your Cybersecurity Research Questions

Michael Mimoso
Risk Management
Vulnerability Management
Zero Trust
Operational Technology

A Strategic Necessity: Compensating Controls in ICS, OT

George V. Hulme
Operational Technology
Vulnerability Management
Operational Resilience

OT Patch Management Truths

George V. Hulme
Typical OT network
Operational Technology
Industrial

The Purdue Model's Risky Blindspot

George V. Hulme
Claroty Team82 Director of Vulnerability Research Sharon Brizinov and Vulnerability Researcher Noam Moshe discuss their research process, the technical resources at their disposal, and the threat landscape.
Operational Technology
Vulnerability Management

Nexus Podcast: Team82 Answers Your Questions

Michael Mimoso

Latest on Nexus Podcast