OT cybersecurity firm Waterfall Security Solutions announced this week that it has opened an office in Singapore.
Located in tallest building in Singapore, the expanded footprint will support the company’s growing customer base in the region.
Best known for its unidirectional gateway products that enable secure IT/OT integration, but prevent network traffic from propagating back into industrial facilities, Waterfall’s new Singapore office will support local sales, marketing, partner program, and technical support teams.
“Waterfall sees Singapore as a strategically important market and as an established gateway to APAC,” said Lior Frenkel, CEO and Co-Founder of Israel-based Waterfall Security. “We look forward to working much more closely with new and existing customers, partners and service providers in the region.”
The opening of its Singapore office follows an expansion into the United Arab Emirates when the company opened an office in Abu-Dhabi earlier this year.
Singapore is also home to the APAC edition of SecurityWeek’s ICS Cyber Security Conference, which will return to a physical/live event format in 2022, following a virtual format due to the Covid-19 pandemic in 2021.
OT Network Security Firm Waterfall Security Opens Singapore Office
OT cybersecurity firm Waterfall Security Solutions has opened an office in Singapore to support industrial customers in the APAC region
Trend Micro Unveils New OT Endpoint Security Solution Made by TXOne
TXOne StellarProtect protects OT endpoints against malware and other threats without requiring an internet connection
The Past & Future of Integrity Attacks in ICS Environments (Video)
Integrity-based attacks can produce significant impacts through undermining a physical process and calling into doubt the viability of a specific facility.
Intelligence Gathering on U.S. Critical Infrastructure
How Open Source Intelligence can be applied to reconnaissance on critical infrastructure. In many cases it’s possible to narrow a search to specific buildings like power plants, wastewater plants, or chemical and manufactured facilities. The research consists of 26,000 exposed devices in United States.
Reconnaissance, Lateral Movement Rise in Manufacturing Firms
(SecurityWeek - Eduard Kovacs) - An unusually high volume of malicious internal reconnaissance and lateral movement have been observed in the manufacturing industry, which experts believe is a result of the rapid convergence between IT and OT networks. The data comes from the 2018 Spotlight Report on Manufacturing released on Wednesday by threat detection company Vectra. The report is based on observations from another report released on Wednesday by the company, the 2018 Black Hat Edition of the Attacker Behavior Industry Report, which shows
ICS Anomaly Detection: Finding the Right Needle in the Relevant Electric Haystack
By Edgard Capdevielle, CEO of Nozomi Networks Power generation, substation and electric grid operators and many other critical infrastructure sectors typically use equipment from a heterogenous assortment of vendors. This equipment runs thousands of real-time processes generating a huge volume of data. Increasing the interconnectedness and digitization of these systems is a pillar of improved operational efficiencies, however, it isn’t risk free. Analyzing and monitoring this data to detect anomalies that might be caused by a cyberattack is akin to searching for
Critical Infrastructure Attacks Drive Startup & Innovation Opportunities
By: Rick Grinnell, co-founder and managing partner of Glasswing Ventures. In this modern connected age, there’s no shortage of risks to fret about. I hate to add one more, but cyberattacks against utilities and power plants have recently rocketed to the top of the list of major security concerns. For instance, a June report from ESET released new research revealing that the Ukrainian power grid was taken down in late 2015 by the Win32/Industroyer malware. This malware has been considered the biggest threat to
DHS Releases ICS-CERT 2016 Assessment Summary Report
By: Eduard Kovacs (SecurityWeek) - The assessments conducted by the U.S. Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) in 2016 showed that inadequate boundary protection has remained the most prevalent weakness in critical infrastructure organizations. ICS-CERT conducted 130 assessments in the fiscal year 2016, which is more than in any previous year. Monitor newsletters published by ICS-CERT this year show that it has already conducted 74 assessments in the first half of 2017. Assessments are offered to both government organizations and private sector companies
What Modular, Network-based ICS Threats Mean to Your Systems
By Cameron Camp, Security Researcher, ESET Industroyer, the recent complex malware targeting industrial control systems, offers attackers a modular complex way to attack systems like the power grid. What are the implications of this? For years, adversaries have been quietly testing the defenses of bulk critical infrastructure like gas and oil systems, hydroelectric dams and the power grid. In recent years, starting with Stuxnet in 2010, more focused attempts at directly manipulating industrial systems have started to gain prominence, including Industroyer, which
How Vulnerable are Our Industrial Control Systems? What We Learned From ICS Attacks of 2016
Multiple cyberattacks on critical infrastructure facilities in 2016 resulted in mere inconvenience or embarrassment. How long can dumb luck keep us from harm? By Michael Shalyt, VP Product, APERIO Systems When the U.S. Energy Department released a nearly 500 page report this month warning of an “imminent” threat to the electrical grid, it was the latest reminder of just how dependent our day-to-day existence is on critical infrastructure networks — from power grids and water supplies to transportation networks and more. In 2016, attackers clearly