Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

CyberX Launches Industrial Threat Intelligence Initiative

Industrial cybersecurity startup CyberX has launched its Industrial Threat Intelligence Platform, which the company says can help utilities identify cyber security threats in operational networks.

Industrial cybersecurity startup CyberX has launched its Industrial Threat Intelligence Platform, which the company says can help utilities identify cyber security threats in operational networks.

The initiative is led by a team of researchers who analyze data sourced from the monitoring of operational networks, forensics and other research.

“The importance of this collaborative effort is to facilitate the adoption of the industrial Internet,” said Nir Giller, CTO at CyberX. “The data we follow and analyze combined with the cooperation from our customers and partners, enables us to provide new insights and more importantly, reveal new vulnerabilities and threats.”

CyberX says its Industrial Threat Intelligence team has already been working with numerous companies on threat mitigation and implementation of security measures, such as removing threats imposed by vulnerabilities related to Human-Machine-Interface (HMI) in ICS networks.

“Every organization with an industrial network must understand the consequences of a breach,” Giller said. “The damage can be much more than financial, it can lead to catastrophic results. We work closely with several utilities and enterprises and currently collaborative efforts are made in order to mitigate the threats that were discovered.”

CyberX says that its intelligence initiative will offer insights into both malicious and operational nature to help protect industrial networks, and disclose vulnerabilities they discover to both ICS CERT and the relevant affected vendors.

Founded in 2013 by Omer Schneider and Nir Giller, both veterans of the Israeli Defense Force (IDF) Elite Cyber Security Unit, CyberX is backed by Glilot Capital, Swarth Group and GlenRock Israel. The company announced a $2 million funding round in June 2014, and has also received support from Palo Alto, California-based accelerator UpWest Labs.  

Related: Learn More at the ICS Cyber Security Conference

Advertisement. Scroll to continue reading.
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Artificial Intelligence

The degree of danger that may be introduced when adversaries start to use AI as an effective weapon of attack rather than a tool...

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).