• Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World
Newsy Today
news of today
Home - ICS
Tag:

ICS

Tech

NVIDIA offers accelerated computing powered by AI to bolster cybersecurity across Operational Technology OT networks

by Chief Editor February 24, 2026
written by Chief Editor

The Rise of AI-Powered Defenses: Securing Critical Infrastructure in a Connected World

Nvidia’s recent push into operational technology (OT) cybersecurity, through collaborations with industry giants like Akamai, Forescout, Palo Alto Networks, Siemens, and Xage Security, signals a pivotal shift in how we protect critical infrastructure. For years, industrial control systems (ICS) – the backbone of energy, manufacturing, transportation, and utilities – have lagged behind traditional IT in cybersecurity preparedness. This is changing, and AI is at the forefront.

From Reliability to Resilience: The OT Security Challenge

Historically, OT environments prioritized reliability and uptime above all else. Systems were often designed for longevity, not to withstand the rapidly evolving landscape of modern cyberattacks. This created a significant vulnerability as these systems became increasingly connected to enterprise networks and the cloud. Unlike IT systems that manage data, OT systems control physical processes, meaning a successful cyberattack can have immediate, real-world consequences – from power outages to manufacturing disruptions.

Zero Trust Extends to the Industrial Edge

The core of this new approach is extending the principles of Zero Trust security to OT environments. Zero Trust operates on the premise of “never trust, always verify,” requiring continuous authentication and authorization for every user, device, and workload. Nvidia is working with Forescout to implement this model in OT, ensuring that no component is implicitly trusted. This is a departure from traditional perimeter-based security, which assumes everything inside the network is safe.

BlueField DPUs: A Secure-by-Design Architecture

Nvidia’s BlueField Data Processing Units (DPUs) are central to this strategy. These specialized processors offload security tasks from CPUs, creating a secure-by-design architecture. They inspect traffic in real-time and enforce Zero Trust policies at the hardware level, isolating workloads and preventing unauthorized access. This hardware-level enforcement is a significant advantage over software-only solutions.

AI-Driven Threat Detection and Response

The power of AI lies in its ability to analyze vast amounts of data and identify anomalies that would be missed by traditional security systems. Operational data generated at the edge – sensor readings, machine logs, control commands – is sent to centralized AI platforms for analysis. Machine learning algorithms detect emerging threats, and enforcement actions are then triggered at the edge, minimizing latency, and disruption. Akamai is collaborating with Nvidia to enable agentless segmentation in OT and ICS environments, further enhancing security.

Real-Time Insights, Localized Action

This hybrid approach – centralized analysis, edge-based enforcement – is crucial. It allows for rapid threat containment without impacting the real-time performance of industrial operations. Siemens and Palo Alto Networks are working with Nvidia to embed security directly into industrial automation systems, creating a more resilient and proactive defense.

Future Trends: The Evolution of OT Cybersecurity

The integration of AI and accelerated computing into OT cybersecurity is just the beginning. Several key trends are likely to shape the future of this field:

  • Increased Adoption of AI-Driven Threat Intelligence: AI will become even more sophisticated at predicting and preventing attacks, leveraging threat intelligence from multiple sources.
  • Expansion of Zero Trust Architectures: Zero Trust will become the standard security model for OT environments, driven by regulatory requirements and the increasing sophistication of cyber threats.
  • Edge Computing as a Security Layer: More security processing will be pushed to the edge, reducing latency and improving response times.
  • Digital Twins for Security Testing: Digital twins – virtual replicas of physical systems – will be used to simulate attacks and test security defenses in a safe environment.
  • Convergence of IT and OT Security Teams: As OT systems become more integrated with IT networks, collaboration between security teams will become essential.

FAQ

What is OT cybersecurity? OT cybersecurity focuses on protecting operational technology systems – industrial control systems, manufacturing equipment, and critical infrastructure – from cyber threats.

What is a DPU? A Data Processing Unit (DPU) is a specialized processor that offloads and accelerates networking, storage, and security tasks from traditional CPUs.

What is Zero Trust security? Zero Trust is a security model that requires continuous verification of every user, device, and workload, regardless of location.

Why is OT cybersecurity important? Cyberattacks on OT systems can have real-world consequences, including power outages, manufacturing disruptions, and safety risks.

What role does AI play in OT cybersecurity? AI is used to analyze data, detect anomalies, and predict threats, enabling faster and more effective responses.

Did you realize? The energy sector is consistently ranked among the most targeted industries for cyberattacks, highlighting the critical require for robust OT security measures.

Pro Tip: Regularly update your OT systems with the latest security patches and firmware to address known vulnerabilities.

Want to learn more about securing your critical infrastructure? Explore Nvidia’s OT security solutions and stay ahead of the evolving threat landscape.

February 24, 2026 0 comments
0 FacebookTwitterPinterestEmail
News

Latvia’s SAB warns of Russian ICS cyber threat to European and Western critical infrastructure

by Rachel Morgan News Editor January 28, 2026
written by Rachel Morgan News Editor

Russia continues to engage in sabotage, information operations, and cyberattack preparations targeting industrial control systems (ICS) in Latvia and other Western nations. These actions, identified by the Latvian Constitution Protection Bureau (SAB) in its 2025 annual report, are intended to create uncertainty, disrupt services, and retaliate against support for Ukraine, as well as discourage future assistance.

Rising Cyber Threats in Europe

The SAB report warns of significantly increasing security risks posed by Russia across Europe, noting a sustained high number of sabotage and cyber incidents. According to the report, Russia remains the primary cyber threat to Latvia, driven by its broader strategic goals and Latvia’s support for Ukraine’s defense efforts.

Did You Know? The Latvian Cabinet of Ministers adopted new cybersecurity regulations on June 25th of last year, setting minimum requirements for critical infrastructure and overseen by the SAB.

While the overall number of registered cyber threats reached an all-time high in 2025 – a multiple increase since Russia’s 2022 invasion of Ukraine – most incidents involved cybercrime and digital fraud, posing limited risk to critical infrastructure. However, the SAB highlights a growing concern regarding threats to operational technology (OT) environments, which control essential services like energy, water, and transportation.

Vulnerabilities in Operational Technology

OT systems, increasingly managed remotely, often lack adequate cybersecurity measures, creating opportunities for malicious actors to gain access and disrupt vital services. ENISA reported that 18.2 percent of cyberattacks in Europe now target operational technologies. Russian hacktivists, the SAB notes, have demonstrated the capability to attack ICS systems in Latvia and elsewhere, aiming to cause disruption and sow discord.

Recent incidents illustrate this threat. In April, a cyberattack in Norway exploited a weak password to manipulate a dam’s water flow. In August, Russian hacktivists successfully shut down a hydroelectric power plant in Gdansk by remotely accessing and altering control systems. So far, Latvian vulnerabilities have been identified through monitoring, and no significant incidents endangering critical infrastructure have been recorded.

Expert Insight: The focus on OT systems represents a significant escalation in cyber risk. These systems, often older and less protected than traditional IT networks, control the physical world, meaning successful attacks can have real-world consequences beyond data breaches.

The report also details ongoing Distributed Denial of Service (DDoS) attacks against Latvian government, municipal, and critical infrastructure entities. These attacks, often timed to coincide with significant dates or political announcements, aim to disrupt services and undermine public trust. A large DDoS attack occurred last July following a Latvian company’s win in an international drone procurement competition.

Frequently Asked Questions

What is the primary cyber threat to Latvia, according to the SAB report?

According to the SAB report, Russia continues to pose the main cyber threat to Latvia due to its strategic goals and Latvia’s support for Ukraine.

What are operational technologies and why are they a growing concern?

Operational technologies are the equipment and software used to control physical processes and infrastructure, such as energy, water, and transport. They are a growing concern because they often lack sufficient cybersecurity and are vulnerable to disruption.

Have any significant cyber incidents impacted Latvian critical infrastructure?

The SAB reported that significant incidents endangering critical infrastructure and vital services have not been registered in Latvia as of 2025, though vulnerabilities have been identified through monitoring.

Given the evolving threat landscape, will Latvia and other Western nations be able to effectively defend against increasingly sophisticated cyberattacks targeting critical infrastructure?

January 28, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

AI reshapes cyber threats as experts warn on automation

by Chief Editor December 12, 2025
written by Chief Editor

AI‑Powered Threat Hunting: Faster, Smarter, but Still Human‑Centric

Security teams are racing to embed artificial intelligence into their hunt‑for‑baddies pipelines. AI can crunch millions of logs in seconds, spot anomalous patterns, and flag suspicious behavior before a traditional signature‑based system ever notices.

Yet experts warn that full automation is a double‑edged sword. An AI‑driven system that automatically isolates a compromised laptop might sound perfect—until it mistakenly shuts down a SCADA controller feeding a power plant. The cost of an unwarranted outage can dwarf any data breach.

“Technology alone won’t define resilience. The best teams hunt for behavior and intent, not just alerts,” says Dave Spencer, Director of Technical Product Management at Immersive.

Real‑World Example: The 2023 SolarWinds Incident

When the SolarWinds supply‑chain attack was uncovered, analysts discovered that static signatures failed to catch the novel backdoor. It was only after manual investigation of unusual network traffic that the breach was confirmed. Today, AI‑enabled UEBA (User and Entity Behavior Analytics) tools aim to spot such “behavioral drift” automatically, but a human analyst still validates the final decision.

IT/OT Convergence: Legacy Systems Meet Smart Controls

Industrial networks are no longer isolated islands. Information‑technology (IT) and operational‑technology (OT) environments are merging, creating a blended attack surface that mixes office‑level phishing with plant‑floor sabotage.

Older PLCs and legacy SCADA components often lack built‑in security, making them attractive footholds for attackers who can pivot into newer, AI‑enabled control systems.

“Success will depend on disciplined change management, exhaustive testing, and efficient use of maintenance windows,” warns Sam Maesschalck, Lead OT Cyber Security Engineer at Immersive.

Case Study: Ukrainian Power Grid Outage (2022)

Threat actors leveraged compromised VPN credentials to infiltrate the grid’s IT network, then moved laterally into OT devices that still ran outdated firmware. The incident sparked tighter NIST guidelines for IT/OT security and accelerated adoption of standards like ISA/IEC 62443.

Extortion 2.0: Data as Fuel for AI Models

Ransomware gangs are already selling stolen credentials on underground forums. The next wave could see criminals offering clean, labeled datasets to AI startups desperate for training material.

Because large language models thrive on high‑quality data, extortionists may demand higher premiums for “AI‑ready” datasets, turning data theft into a commodity market.

“Threat actors may threaten to sell stolen data to AI companies hungry for new training material,” predicts Ben McCarthy, Lead Cyber Security Engineer at Immersive.

Recent Trend: AI‑Assisted Malware

Proof‑of‑concept tools now let a malicious script call an LLM API to generate polymorphic code on the fly. This capability enables malware that adapts its payload in real time, evading static detection.

AI‑Driven Deception: The Rise of Hyper‑Realistic Social Engineering

Deepfake videos, AI‑generated voice clones, and personalized phishing lures are moving from novelty to everyday weapon.

When an AI can synthesize a CEO’s voice with perfect cadence, the “business email compromise” playbook becomes dramatically more convincing.

“Organizations that rely solely on technology, processes, and policies will fail,” says John Blythe, Director of Cyber Psychology at Immersive.

Did you know?

According to a 2024 Verizon Data Breach Investigations Report, 71 % of breach incidents involved some form of social engineering—and the success rate jumps when AI‑generated content is used.

Building True Resilience: People, Process, and Technology

Resilience isn’t a checkbox; it’s a proven capability. Companies must demonstrate that automated defenses, legacy controls, and human operators can all respond in sync under pressure.

Key steps include:

  • Running continuous red‑team exercises that blend AI‑based attack simulations with manual phishing drills.
  • Maintaining an up‑to‑date asset inventory that spans both IT and OT environments.
  • Adopting zero‑trust principles that enforce granular, context‑aware access across converged networks.

Pro tip

Integrate a “shadow IT” scanner into your SIEM. It will surface unsanctioned devices—like a workstation running an old HMI client—before attackers can abuse them.

FAQ

  • Will AI replace security analysts? No. AI augments analysts by filtering noise, but final judgement still rests with humans.
  • How can legacy OT devices be protected? Use network segmentation, strict access controls, and overlay security gateways that inspect traffic without altering device firmware.
  • Are deepfake attacks common today? They’re rising fast. A 2023 study by the FBI showed a 300 % increase in deepfake‑related fraud cases within a year.
  • What regulations address IT/OT security? Standards like ISA/IEC 62443, NIST 800‑82, and emerging EU CSDR guidelines set baseline controls for converged environments.
  • How should organizations test AI‑driven defenses? Conduct “attack‑in‑the‑loop” drills where AI tools generate simulated threats that analysts must investigate.

Next Steps for Your Organization

Ready to future‑proof your security posture? Start by mapping every asset—old PLCs, cloud workloads, and employee laptops—then layer AI‑enhanced monitoring on top of a solid zero‑trust framework. Finally, run regular, realistic tabletop exercises that blend AI‑generated phishing with hands‑on incident response.

Have thoughts on AI‑driven cyber threats? Contact us, share your experiences in the comments below, and subscribe to our newsletter for the latest insights.

December 12, 2025 0 comments
0 FacebookTwitterPinterestEmail
Tech

Integrating AI and ML technologies across OT, ICS environments to enhance anomaly detection and operational resilience

by Chief Editor April 20, 2025
written by Chief Editor

Revolutionizing Cybersecurity with AI in OT/ICS Environments

As AI and machine learning technologies become more integrated into Operational Technology (OT) and Industrial Control Systems (ICS) environments, they are enhancing the detection of anomalies and reshaping cybersecurity approaches. Experts like Ofir Arkin from NVIDIA and Jeffrey Macre from Darktrace highlight how AI helps overcome traditional cybersecurity limitations, offering greater precision and real-time threat detection.

How AI Transforms Threat Detection

Using AI-powered behavioral analytics allows OT networks to identify unusual command patterns or operational behaviors that stray from the norm. For instance, telemetry data analysis can uncover devices operating outside their typical parameters, facilitating predictive maintenance and enhancing operational resilience. Darktrace leverages unsupervised machine learning to monitor network communication patterns within ICS environments, reducing false positives by distinguishing normal from anomalous activities.

Challenges and Solutions in Data Quality

Data quality poses significant challenges in OT/ICS environments, characterized by limited connectivity and low processing power. Clint Bodungen of ThreatGEN suggests that AI’s ability to process vast datasets efficiently addresses these challenges. Solutions like establishing hybrid architectures with edge computing devices allow for local data preprocessing, enabling higher-quality data collection without overwhelming central systems.

Decoding Zero-Day Threats with AI/ML

One of the most significant advancements AI offers is its ability to identify zero-day threats through behavioral analysis. Instead of relying on known threat signatures, AI/ML models establish norms and detect deviations, such as unexpected data flows or protocol misuses, indicating potential threats. Cross-device learning allows AI to consider contextual information from various devices, enhancing threat detection accuracy.

The Double-Edged Sword of AI in Cybersecurity

While AI significantly reduces false positives by using contextual alerts and anomaly correlations, false negatives remain a concern. Organizations like NVIDIA mitigate these through continual model tuning and human oversight in anomaly detection workflows. The strategic balancing of sensitivity and accuracy ensures critical threats are identified and addressed promptly.

Future Skills for Cybersecurity Teams in the AI Era

The integration of AI in cybersecurity necessitates new skills for OT/ICS teams. Understanding industrial protocols, interpreting behavioral anomalies, and managing AI systems are crucial. Knowledge sharing and leveraging standardized frameworks, such as the NIST Cybersecurity Framework, foster effective collaboration and consistency in managing cybersecurity threats.

Frequently Asked Questions (FAQ)

What are the main benefits of using AI in OT/ICS environments?

AI enhances threat detection, reduces false positives, and supports real-time responses to anomalies, improving overall cybersecurity resilience.

How can OT/ICS teams prepare for the AI revolution?

Investing in training around AI systems, industrial protocols, and behavioral analysis, while leveraging industry standards, will help teams adapt to the AI-driven cybersecurity landscape.

Pro Tips for Enhancing AI Cybersecurity

Did you know? AI systems can identify anomalies through continuous learning, adapting to evolving threat landscapes without predefined threat signatures.

Pro Tip: Regularly update AI models and train teams to interpret the data-driven insights to maintain a robust cybersecurity posture.

Stay ahead in cybersecurity by continuing to explore more on how AI is transforming OT/ICS environments. Feel free to share your insights in the comments below or subscribe to our newsletter for the latest industry trends and updates.

This article presents a comprehensive exploration of AI’s role in OT/ICS cybersecurity, complete with real-world examples, data-driven insights, and actionable advice. The content structure includes engaging subheadings, concise paragraphs, and interactive elements like pro tips and FAQs, together with a compelling call-to-action.

April 20, 2025 0 comments
0 FacebookTwitterPinterestEmail
Business

Roping in cyber risk quantification across industrial networks to safeguard OT asset owners amid rising threats

by Chief Editor February 16, 2025
written by Chief Editor

The Future of Cyber Risk Quantification in Industrial Sectors

As cyber threats evolve, industrial sectors face increased pressures to modernize their risk quantification methods. Traditional risk assessment techniques are no longer sufficient in addressing the sophisticated threats posed by cyber adversaries.

The Rise of Consequence-Based Engineering

One significant trend is the shift towards consequence-based engineering. This approach prioritizes understanding the potential impact of cyber incidents on operations, safety, and financial performance, rather than just preventing breaches.

For instance, an increasing number of companies are adopting this framework to assess risks related to critical infrastructure. By evaluating the possible outcomes of cyber attacks, industries can allocate resources more effectively and prioritize high-risk areas.

Integration of Advanced Technologies

The integration of AI and machine learning into cyber risk frameworks is becoming more prevalent. These technologies help organizations identify patterns and predict potential threats, enhancing their ability to respond proactively.

For example, modern cybersecurity tools leverage AI to provide real-time threat intelligence, allowing industrial enterprises to respond quickly to incidents and minimize disruptions. This advance within industries marks a significant step toward more dynamic risk quantification models.

Real-World Impacts and Strategies

Especially in sectors like energy and manufacturing, the cost of underestimating cyber risks could lead to severe financial and operational repercussions. Recent incidents have shown that failures in protecting critical infrastructure can result in widespread outages and economic losses.

To mitigate such risks, enterprises are investing heavily in securing industrial control systems (ICS) and operational technology (OT). By integrating robust cyber strategies, these sectors are not only complying with regulatory standards but also fortifying their long-term resilience against evolving threats.

Improving Cross-Industry Collaboration

Collaboration is key in addressing cyber risks. Engaging in knowledge-sharing initiatives and partnerships helps organizations harness collective expertise and resources, leading to more comprehensive risk models and improved threat mitigation strategies.

Initiatives like the Cyber Security Information Sharing Partnership (CISP) provide platforms for exchanging threat intelligence and best practices, enhancing security postures across the board.

FAQ Section

What is consequence-based engineering?
It’s a methodology that identifies and analyzes the potential impacts of cyber incidents on a business, guiding resource allocation and response strategies.

How does AI contribute to risk quantification?
AI enhances traditional risk assessment by predicting threats, analyzing data patterns, and automating responses to potential cyber incidents.

Why is cross-industry collaboration important?
Collaboration allows organizations to share insights and develop more robust security solutions, leading to enhanced protection across different sectors.

Looking Ahead

The future of cyber risk quantification will see greater adoption of sophisticated tools and collaborative frameworks, enhancing risk preparedness across industrial sectors. As industries continue to innovate and share knowledge, they strengthen their defenses against an ever-evolving threat landscape.

DID YOU KNOW? Organizations that have invested in integrated cyber risk solutions have seen a reduction in response times to security incidents by up to 30%.

Final Call to Action

Are you ready to explore more about industrial cybersecurity advancements? Visit our website for insightful articles and expert analyses. Subscribe to our newsletter to stay updated on the latest trends and strategies shaping the future of cyber risk management.

February 16, 2025 0 comments
0 FacebookTwitterPinterestEmail

Recent Posts

  • US Scientists’ Deaths & Disappearances: NASA, Nuclear Labs & Pharma Under Scrutiny

    April 11, 2026
  • PS6 Price: Trade Tariffs May Push Console to $1000

    April 11, 2026
  • FC Twente Beat Volendam 2-1: Pressure on NEC & Feyenoord | Eredivisie Update

    April 11, 2026
  • Human Echolocators Can ‘See’ With Sound, And Brain Scans Reveal How : ScienceAlert

    April 11, 2026
  • Best Stabbing: Suspect Arrested in Horeca Owner Attack

    April 11, 2026

Popular Posts

  • 1

    Maya Jama flaunts her taut midriff in a white crop top and denim jeans during holiday as she shares New York pub crawl story

    April 5, 2025
  • 2

    Saar-Unternehmen hoffen auf tiefgreifende Reformen

    March 26, 2025
  • 3

    Marta Daddato: vita e racconti tra YouTube e podcast

    April 7, 2025
  • 4

    Unlocking Success: Why the FPÖ Could Outperform Projections and Transform Austria’s Political Landscape

    April 26, 2025
  • 5

    Mecimapro Apologizes for DAY6 Concert Chaos: Understanding the Controversy

    May 6, 2025

Follow Me

Follow Me
  • Cookie Policy
  • CORRECTIONS POLICY
  • PRIVACY POLICY
  • TERMS OF SERVICE

Hosted by Byohosting – Most Recommended Web Hosting – for complains, abuse, advertising contact: o f f i c e @byohosting.com


Back To Top
Newsy Today
  • Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World