Cybersecurity Blog: The Cyber Scene is evolving, are you?

Leidos has just enhanced its Industrial Defender ASM® to support passive monitoring of ICS assets, now combining market leading active monitoring with full passive monitoring support. Adding passive monitoring support increases key asset visibility capabilities and enhances our customer’s ability to detect and prevent anomalous behavior.

Read more

With their proprietary control protocols and use of specialized hardware and software, early industrial control systems (ICS) had little resemblance to traditional information technology (IT) systems.  However, today’s ICS environments are using industry standard computers, operating systems (OS) and network protocols, putting them at risk of cybersecurity vulnerabilities and incidents. The increased use of wireless networking further acerbates the security issue.

Read more

Cyber attacks are rising faster than ever, resulting in malicious threats infiltrating corporate networks and just about anything technology based. This reality has brought about a shift in the cybersecurity landscape and for good reason.

Read more

Struggling with internal security teams that are short-staffed, overworked, and underskilled, today’s CISOs are turning to information security consulting providers for needed expertise. But who should they turn to in a market full of choices?

Read more

At the Black Hat 2017 conference in Las Vegas, Leidos gave a sneak peek at a new product for critical infrastructure customers—Arena Asset Visibility and Insights (AVI). The product’s concept was driven by interactions with customers who shared concerns over the lack of situational awareness and visibility into their industrial control systems (ICS) network. While most have a wealth of tools and processes to aggressively monitor and respond to threats and security incidents to their Enterprise IT network, their Operations (OT) side is typically only monitored up to the edge of the IT/OT firewall. For the Security Analysts in the SOC, managers who act as a liaison between the plants, corporate IT, and the plant operation managers, OT awareness is minimal.

Read more

The cyber-attack on Ukraine power centers last December — an event that took 30 substations offline and left more than 230,000 residents without power — was a rude awakening for power generation plants and distribution centers around the world. Despite being well-segmented from the control center business networks with robust firewalls — notably more secure than some U.S. operations — the network was still breached.

Read more

Insider crimes are a very real and costly problem for companies—often more costly than high profile cyberattacks. Despite continued investments in security measures to control and monitor access to sensitive data, more organizations feel vulnerable to breaches caused by insiders. In fact, according to a recent survey of security professionals conducted by LinkedIn’s Information Security Community and Crowd Research Partners, 74% of respondents say their organizations are vulnerable to insider threats, and 56% say insider threat incidents have become more frequent in their organization in the last 12 months.

Read more

An evolving threat landscape, persistent adversaries, and a shortage of talent and skills are some of the reasons security teams struggle to successfully defend their organizations. However, the biggest roadblock to a successful defense is often self-inflicted.

Read more

For security teams, monitoring the security status of an IT network is common practice, while the routers, switches, and gateways of industrial networks go largely unchecked. Fortunately, this is changing. With the rapid increase in cybersecurity incidents affecting industrial control systems (ICS), more and more organizations are adopting ICS security programs to keep their operations running and people safe. If your organization plans (or is already underway) to develop its own ICS security program, here are four foundational elements to help you build the most effective program possible.

Read more

Successful integration, motivated leaders, and driven employees propel Leidos to the #1 fastest growing cybersecurity consulting company


Coming in at the No. 1 spot with an astronomical growth rate of 82.1 percent year over year was Leidos. The company reported cybersecurity consulting revenues of $285 million in 2016, up from $157 million the year before. – CRN.com

Read more