Articles avec le tag ‘vulnérabilités’
Le fournisseur de solutions de sécurité “Wurldtech Security Technologies” vient de lancer la première base de données sur les vulnérabilités de sécurité des logiciels de contrôle des systèmes et d’acquisition de données (SCADA). Ce fournisseur apporte des solutions aux vendeurs, développeurs et intégrateurs du monde entier. Les outils SCADA sont primordiaux et il est essentiel de comprendre les risques sécuritaires de certains de ces logiciels qui gèrent les infastructures mondiales les plus critiques.
The industry’s first cyber-security vulnerability database for industrial control systems was launched this week by security solutions provider Wurldtech Security Technologies.
The vendor provides solutions to operators of SCADA, process control systems worldwide and has dubbed the new database Delphi.
It is designed to provide vendors, operators, system integrators, and service providers unparalleled visibility into the reliability, safety and security of the systems and networks essential to the operation of the world’s critical infrastructure.
Wurldtech CEO, Tyler Williams, said the company understands the unique security challenges facing the industrial automation industry today, particularly when attempting to address the issue of securing legacy industrial control systems.
"Our mission is to provide meaningful cyber-security solutions to safeguard the integrity of critical industrial automation and we are proud to announce Delphi, yet another tool to help our customers accurately identify real risks and make better-informed decisions to protect their industrial operations," he said. As cyber-security risks increase in frequency, severity and sophistication, Williams said the process of managing the security of SCADA and process control systems is becoming extremely difficult.
Currently, security solutions for legacy industrial control systems are delivered through a small number of companies and disparate commercial products from different vendors lack integration and interoperability.
The end result, according to Williams, is a high degree of complexity, increased operational costs, limited visibility and reliance on inappropriate data to make critical security decisions.
"For a majority of industrial organizations, the outcome is a weak security risk profile – an insecure network infrastructure, incomplete regulatory compliance, security audit failures and increased security management costs that are not in line with business objectives," he said.
Joe Weiss of Applied Control Solutions, LLC, said a major industry challenge is the lack of known specific security risks that could impact the reliability and availability of industrial control systems.