Vendor claims to be the first to offer device-level protection solutions designed for legacy and new industrial machinery and smart factory production lines. Credit: Metamorworks / Getty Images NanoLock has announced the launch of a new suite of zero-trust cybersecurity solutions for the industrial and manufacturing market. In a press release, the firm claimed to be the first to offer device-level protection solutions designed specifically for legacy and new industrial machinery and smart factory production lines. The launch comes in the wake of a joint cybersecurity alert surrounding advanced persistent threat (APT) attacks on industrial control systems (ICS) and supervisory control and data acquisition (SCADA) devices.Zero-trust approach prevents unauthorized modificationNanoLock’s industrial product suite was developed in cooperation with industrial and manufacturing companies to protect ICS devices and industrial machines, ensuring the operational integrity of machines and production lines without impacting performance and functionality, the firm said. It has been designed to integrate with devices and systems to provide a device-level zero trust security approach that prevents unauthorized modification attempts, protecting connected industrial devices from multiple attack vectors.“The chaotic reality of the cybersecurity landscape is that there is no way to know where the next attack will come from, so the world must move away from detection to prevention to ensure business continuity,” commented NanoLock CEO Eran Fine.APT actors targeting ICS/SCADA devices with custom attacksA recent joint cybersecurity advisory from the U.S. Department of Energy (DOE), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the FBI emphasized the need for enhanced security approaches to protect industrial/OT environments from APT cyberattacks. “APT actors have developed custom-made tools for targeting ICS/SCADA devices,” the advisory read. “The tools enable them to scan for, compromise, and control affected devices once they have established initial access to the operational technology (OT) network.” Organizations in the space were urged to implement mitigations to address the threats posed to ICS/SCADA systems, including:Isolate ICS/SCADA systems and networks from corporate and internet networks using strong perimeter controls.Limit communications entering or leaving ICS/SCADA perimeters.Enforce multi-factor authentication for all remote access to ICS networks and devices whenever possible.Enforce the principle of least privilege.Leverage continuous OT monitoring to alert on malicious indicators and behaviors.Limit ICS/SCADA systems’ network connections to only specifically allowed management and engineering workstations. Related content news Okta launches Cybersecurity Workforce Development Initiative New philanthropic and educational grants aim to advance inclusive pathways into cybersecurity and technology careers. By Michael Hill Oct 04, 2023 3 mins IT Skills Careers Security news New critical AI vulnerabilities in TorchServe put thousands of AI models at risk The vulnerabilities can completely compromise the AI infrastructure of the world’s biggest businesses, Oligo Security said. By Shweta Sharma Oct 04, 2023 4 mins Vulnerabilities news ChatGPT “not a reliable” tool for detecting vulnerabilities in developed code NCC Group report claims machine learning models show strong promise in detecting novel zero-day attacks. By Michael Hill Oct 04, 2023 3 mins DevSecOps Generative AI Vulnerabilities news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe