The Radiflow Cyber-Security Blog
Highlights from the Radiflow-CyberProof Joint Webinar: “Understanding and Managing OT Security Risk”
Radiflow’s joint webinar with CyberProof covered various topics related to applying business-driven risk management toward optimization of OT security systems.
Webinar Highlights: Transitioning to a converged IT/OT cyber security solution
In the Webinar, Radiflow’s Rani Kehat and CyberProof’s Aman Malhotra presented a solution for a streamlined IT-OT convergence model with a unified security system, which helps users retain full system visibility and mitigate security risks.
Three takeaways from Dale Peterson’s interview with Radiflow CEO Ilan Barda
Radiflow CEO Ilan Barda is interviewed on Dale Peterson’s “Unsolicited Response” video series, where the two discussed Radiflow’s OT risk management solution including pros and cons of an integrated iSID-CIARA solution, the needs of OT security consultants vs. MSSPs, and more.
ICS Security: Best Practices Derived from Regulatory Standards
Industry best practices and regulatory standards, such as IEC 62443, provide an excellent framework for understanding network risk and planning an optimize OT network protection system for the long-term.
What is Cyber Alert Fatigue & How to Avoid it
Whilst alert fatigue is understandable, it is also potentially very dangerous. You need a clear strategy for dealing with potential cybersecurity fatigue, and ensuring that alerts are of the highest possible quality in order to minimize the incidence of important alerts remaining ignored.
Continuous Monitoring of OT Key Risk Indicators (KRIs)
Assessing OT network risk requires knowing both the impact and the Loss Event Frequency associated with a specific threat. “Guesstimating” would result in skewed findings; therefore, a data-driven approach, based on breach attack simulation is needed.
Know Thy KRIs: Four Takeaways from Gartner’s “Hype Cycle 2021” Report
Gartner’s 2021 Hype Cycle Report recommends the use of key indicators for measuring the effects of OT cybersecurity systems, for Risk (KRIs), Controls (KCIs) and overall performance (KPIs). Radiflow’s CIARA risk assessment & management platform strictly adheres to this framework.
How to Prepare an Industrial Cyber Incident Response Strategy
Effective industrial cybersecurity starts with devising an OT security strategy through a structured process of gathering information about the ICS network and its components, setting up a threat detection mechanism, and planning further threat mitigation measures.
Industry 4.0 and Cybersecurity: Securing the Operational Technology (OT) Environment
Industry 4.0 has brought about many efficiencies in production and oversight, but at the same time exposed industrial (OT) networks to threats. In this post we review the fundamentals of protecting ICS automation networks.
How to Prevent Cyber Attacks on Water and Wastewater Facilities
Water utilities can improve their OT risk posture and optimize their industrial cybersecurity expenditure using IEC62443-compliant tools for ICS threat detection, network visibility and cyber-risk management.
How to Perform Non-Destructive OT Security Assessments with Digital Image-Based APT Breach Simulations
Radiflow’s digital image-based APT simulation method, used for assessing network risk the effectiveness of mitigation measures, is 100% non-destructive, making it the preferred tool for industrial risk assessment.
What is MITRE ATT&CK for ICS and how is it transforming ICS cyber-security?
In this post we provide an overview of the MITRE ATT&CK cyber-threat knowledge base, implemented within CIARA’s APT analysis, and its twelve categories for possible industrial breach tactics.
Why Cyberattacks on Manufacturing are on the Rise
Michael Langer, Radiflow’s Chief Products Officer, examines the root causes for the rise in cyberattacks on industrial (aka ICS/OT/SCADA) organizations, and provides guidelines for mitigating OT network risk.
Linking Asset-Based and Adversary-Based Risk Analyses
Radiflow’s VP Business Development Rani Kehat explains the differences between asset- and adversary-based cyber-risk analyses, and how combining the two approaches helps to produce better risk scoring and optimize OT security expenditure.
Global Phishing Campaign Targets the Energy Sector and Other CNI Enterprises
Radiflow Chief Product Officer Michael Langer provides insight on the recent wave of global phishing attacks primarily focused on South Korean companies, and discusses the potential threat to industrial (OT) companies that may not be adequately protected.













