The U.S. Department of Homeland Security (DHS) has acknowledged that a public utility in the U.S. was recently compromised by a sophisticated hacker group.
Cyber-attacks on critical infrastructure are now occurring daily. From pharmacy’s prescription systems to surveillance cameras at casinos and large utilities, every organization is a potential target. In the first half of 2013 alone. the U.S. Department of Homeland Security investigated over 200 serious cyber-attacks against critical infrastructure networks.
This, together with the exponential growth expected in the number of network devices being managed by utilities over the next few years means we’re only seeing the start of the epidemic.
There more and more devices being added to the Industrial Internet
Some systems were implemented decades ago when sophisticated attacks were less common
Our world has become smarter with more machines-to-machine communications, meaning more options for potential attacks
Attackers are evolving and so are their attacks, as such the level of sophistication increases
Most systems, which at current times are part of in the Industrial Internet, were implemented decades ago at a time when the risk of a sophisticated attack on them was considered very low. Coupled with the explosion of the Internet of Things and machine-to-machine communications calls for a distinct and fundamental change in the way the Industrial Internet is protected.
Low touch integration and platform agnostic systems utilizing innovative technology to protect the Industrial Internet. A paradigm shift, if you will, in cyber security - combining both security and operations of complex networks to provide a more robust, context aware, security solution.
CyberX provides exactly this, with an advanced security platform for various industries, ranging from Energy and Manufacturing to intelligent connected devices. CyberX seamlessly collects data from all around the network and passes it to its backend servers, where Big Data and Machine Learning are utilized to create real understanding of the operational behavior of the network.