Complexity Of ICS SCADA Security

1812 0

Critical Infrastructure Operators are like the man in the middle caught between a continuing assault from hackers on systems and management’s reluctance to implement new security technologies for fear of downtime and incompatibility. Edgard Capdevielle, CEO at Nozomi Networks commented below.

Edgard Capdevielle, CEO at Nozomi Networks:

“The challenges of protecting ICS are real.  Attacks targeting them are on the rise and there are legitimate concerns from asset operators that tackling security will impact uptime of critical systems.  Fortunately, we have entered a new era of ICS cybersecurity protection.  Amid escalating attacks, security innovations have emerged that can protect ICS environments completely passively, with no impact on operational availability. Using artificial intelligence and machine learning these technologies provide both real-time monitoring and anomaly detection.  They combine behavior-based and signature-based detection and, alert operators immediately of possible attacks or operator errors.  As a result, immediate action can be taken to minimize or avoid operational impact.  The tide is changing in-favor of the ICS and SCADA defenders who turn to new, passive, ICS cybersecurity innovations to combat cyber-attacks on their critical operational systems.”


If you are an expert on this topic:

Dot Your Expert Comments

SUBSCRIBE to alert when new comments are posted on this news. :



Join the Conversation

Join the Conversation


In this article