Search results for: operational technology
Zero Trust Security for Microgrids and Energy Control Systems
Key Points Growing Cyber Risk in Microgrids: The distributed nature, two-way data flows, and device diversity in microgrids greatly expand the attack surface, making traditional perimeter-based security insufficient. Limitations of Legacy Security: Older “verify then trust” models lack device-level authentication/encryption, leaving systems vulnerable if an insider device is compromised and failing to protect at Purdue…
Read MoreProtecting Airport Baggage Handling Systems from Cyberattack
Key Points Growing Cyber Risk for BHS: Airport baggage handling systems, running on legacy OT hardware and insecure protocols like Modbus and BACnet, are increasingly vulnerable to ransomware, insider threats, and state-sponsored cyberattacks. High Impact of Disruption: A BHS outage can cause major operational delays, lost luggage, passenger frustration, and even compromise sensitive passenger data.…
Read MoreCybersecurity Challenges in Retrofitted Smart Buildings
Key Points Legacy Systems Are Inherently Vulnerable: Most retrofitted buildings rely on outdated OT devices and insecure protocols (like BACnet and Modbus) that lack basic cybersecurity features such as encryption and authentication. Integration Increases Risk: Retrofitting often connects legacy OT systems to modern IT networks without proper segmentation, exposing buildings to lateral movement and cyberattacks.…
Read MoreDOME™ Delivers Post-Quantum Protection for Building and Industrial Control Systems
Veridify’s post-quantum update to its DOME Sentry™ Appliance supports NIST’s recommendation to provide long-term cybersecurity protection for civilian and national security systems. Shelton, CT (May 8, 2025) — Veridify Security, the leading provider of device-level cybersecurity for IoT and Operational Technology (OT) networks and devices, announced that DOME™, their solution for IoT, industrial, and building automation…
Read MoreQuantum-Resistant Security for IoT and M2M Devices
Key Points Quantum Threat to Existing Encryption: Quantum computers will be able to break today’s widely used encryption methods (like RSA and ECC) in minutes, making current IoT and M2M device security obsolete. IoT/M2M Vulnerabilities: These devices have long lifespans, limited ability to receive updates, and often perform critical functions—making them high-value targets for future…
Read MoreSecuring Critical Infrastructure to Reduce OT Cyber Risks and Impacts
Webinar Summary – Securing Critical Infrastructure (OT) In the webinar about securing critical infrastructure hosted by KMC Controls, the panelists discussed critical infrastructure and the importance of hardening operational technology (OT) against cyber vulnerabilities. The session featured insights from Sandy Kline, Louis Parks, and Paris Stringfellow, who shared their extensive experience in cybersecurity and operational…
Read MoreVeridify Enhances DOME Sentry Cybersecurity with Multi-Protocol Model
Closes critical cyber protection gap between Operational Technology and Managed Services on shared Building Networks Shelton, CT (January 14, 2025) — Veridify Security, the leading provider of device-level cybersecurity solutions for building automation and industrial controls, today announced multi-protocol enhancements for the DOME Sentry™. With this software release, the DOME Sentry will now provide NIST Zero…
Read MoreEU NIS2 Directive and Implications for BAS-BMS Cybersecurity
The EU NIS2 Directive (Network and Information Security 2 Directive), which replaces and expands on the original NIS Directive, aims to strengthen cybersecurity requirements across critical sectors, including energy, healthcare, transportation, and digital infrastructure. While not explicitly focused on building automation systems (BAS), its implications for such systems are significant, particularly for facilities considered critical…
Read MoreBuilding Automation Endpoint Protection Is Critical for Cybersecurity
Building automation systems (BAS), now highly-connected to the internet, have transformed how the infrastructure of residential, commercial, and industrial properties is managed and optimized. From heating, ventilation, and air conditioning (HVAC) systems to lighting, security, life safety, and power distribution, these systems are now smart, centralized, and increasingly automated. While this level of convenience and…
Read MoreBACnet Secure Connect
BACnet Secure Connect (BACnet/SC) and BAS / BMS Cybersecurity BACnet Security Challenges BACnet started as a serial-based protocol and building operational technology (OT) systems were generally not connected to other systems inside or outside of the building. Therefore, there was no security built into the protocol and the messages were plain text. The BACnet standard…
Read More