OPSWAT released a new version of Metadefender Client that includes media validation, which allows it to be deployed with Metadefender Kiosk as part of a comprehensive solution to handle portable media in secure environments.
Søren Elnegaard Petersen, Key Account Manager at Arbit Security, discusses the essential security components for organizations using isolated or air-gapped networks. Read our guest post from the unidirectional networking experts, and learn how data diodes can improve security and usage of your network.
The security risks of using portable media have been increasing, as the sophistication of malware has advanced over time. Read our month-in-review post to catch up on the most destructive malware of all time, the most recent media security innovations, and learn three ways to mitigate USB risks.
Attacks are becoming more sophisticated as digital control systems grow in complexity, and require different levels of automation. Learn how to meet these increasingly sophisticated challenges, and secure any sensitive Industrial Control Systems and SCADA network with threat-free data flows using an SFT server.
We are excited to announce the latest release of our Metadefender kiosk product, which is now available for download on the OPSWAT Portal. All customers with active Metadefender licenses can now download and install the latest version of Metadefender. We encourage all current customers to upgrade to the latest version as soon as they are able. As a reminder, configurations can be exported from your current version and imported into Metadefender 3.0.8.
According to the recently released 2015 Dell Security Annual Threat Report, SCADA attacks are on the rise. The report found that in 2014 the number of attacks on Supervisory Control and Data Acquisition (SCADA) systems doubled compared to the previous year. Most of these attacks occurred in Finland, the United Kingdom, and the United States, probably due to the fact that in these countries SCADA systems are more likely to be connected to the Internet.
Air gapped networks are purposely disconnected from the outside internet to prevent malicious actors from accessing critical data. The computers that control critical infrastructures such as power grids, nuclear reactors, and SCADA systems are cut off from the internet for security reasons. The most famous attack on an air gapped network is of course Stuxnet, a highly sophisticated piece of malware that was delivered via USB. It is suspected that the U.S. and Israel teamed up to create the worm to sabotage Iran’s nuclear centrifuges.