NIST Recommendations For IoT & ICS Security
NIST’s latest report demonstrates how purpose-built IoT & ICS anomaly detection technologies can effectively reduce the risk of destructive cyberattacks.
The latest NIST report describes how IoT & ICS anomaly detection technologies like CyberX enable manufacturing organizations to effectively reduce the risk of destructive cyberattacks — such as WannaCry, NotPetya, and TRITON — without impacting OT networks.
The report, a product of close collaboration between NIST’s National Cybersecurity Center of Excellence (NCCoE), CyberX and other and technology providers, presents detailed findings and a reference architecture that organizations can use for their own environments. This comprehensive executive summary reveals:
- Why behavioral anomaly detection (BAD) capabilities are needed for the detection of zero-day threats – and why traditional tools relying on predefined signatures are not effective
- How the security characteristics of BAD map to the NIST Cybersecurity Framework
- How to prioritize remediation of your organization’s most critical vulnerabilities, based on risk
- How to use NIST’s reference architecture for your own ICS & IoT environment
Get all the findings and expert recommendations: Download the Executive Summary.
The post NIST Recommendations For IoT & ICS Security appeared first on CyberX.
Article Link: https://cyberx-labs.com/resources/nist-recommendations-for-iot-ics-security/