Resources
We are committed to making the world a safer place, and we relentlessly strive to innovate and improve our solutions, enabling them to address all challenges of the fast moving Industry 4.0 with the most advanced Cyber Security solutions.
Discover here whitepapers, press releases, tech talks, and news from around the world.
News
Updates from us and from the world
BlackBear's observations: Two-way communication can cause possible exposure of critical assets.
BlackBear's observations: Firewalls are inadequate for this type of attack, since the command format itself is valid, even though the value is incorrect.
BlackBear's observations: Data Diodes are used to segment networks in a simple and effective way.
Whitepapers & case studies
To see is to believe
When talking about data Diodes, a question that people often ask is, “So, what’s the difference between firewalls and Data Diodes?” We say that the two are complementary, as Data Diodes provide additional security measures for especially vulnerable network.
According to ISA62443 specification, any networking component that can be configured dynamically should follow the below…
Discover what risks the OT may pose to itself and to the enterprise
We have always been led to believe that the best way to secure a network, a system, or a subnet is toisolate it from the rest of the network. In short: disconnect it.
Also, we tend to believe OT subsystems are immune from threats because threats will only originate from the enterprise or upstream networks…
Authentication and tracing logs
Misconfiguration is a common issue in network Cyber Security events. They may be caused by intentional or unintentional operator changes, or sometimes by attacks from external networking.
According to ISA62443 specification, any networking component that can be configured dynamically should follow the below…
Robust and secured networking solutions for substations
Electricity serves an important part to the economy and to people’s day-to-day activities. A power grid that fails can cause catastrophic damages.
Secure your OT with Data Diode and IDS
For industrial and corporate giants, data has been incredibly useful to provide daily insights for improvement everywhere. Thus, OT gradually converges with IT, transforming the traditional operation model towards automation to improve productivity. However, convenience and productivity have introduced more attack vectors to the OT environment and created more opportunities for malicious activities. OT systems which were designed many decades ago are now exposed to a lot of risk.
Protecting PLCs in a smart-grid digitalization system
Programmable logic controllers (PLCs) are the most important components of industrial control systems, providing the high performance and efficiency that is necessary for automation. They receive information from input devices (e.g. sensors), process the data, and conduct necessary actions based on pre-programmed parameters. These days, PLCs are also more integrated and interconnected with other complex systems and open source solutions.
Securing sophisticated machines with high data transfer rates and complicated protocols
Machinery these days are highly sophisticated and expensive, consisting of a lot of sensors, moving parts and computing power.
In the long term, they can produce high return on investment for companies, replacing manual workforce in critical areas that require high precision and productivity. However, when machines act as the brains for operation and are connected to a lot of industrial devices, a security breach can put the whole operation at stake.
Streamline NERC CIP Compliance with BlackBear Intelligent Gateway
The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) is a set of standards developed by NERC, aimed to heighten the protection level of Bulk Electric System
(BES) cyber assets and to prevent potential instability and operational interruption. NERC CIP covers the United States, several provinces in Canada, and one state in Mexico. Failure to comply can lead to penalties up to $1 milliion USD per day depending on the violation severity [1]. It also serves as reference for some regions that it does not directly apply to.
Proven excellence
Penetration tests
Our technology has passed
penetration tests by various
professional laboratories
around the world.
Cybersecurity standards
Our solutions comply with ISA
62443-4 SL3 through two basic
principles, Defense in Depth and
Zones & Conduits.
Industrial grade specifications
Leveraging over 30 years of group
experience, our products run with
industrial-grade EMC and wide
operation temperatures, and can be
deployed in a broad range of harsh
environments.
experience in
industrial networks
validated by renowned
OT cyber security labs
around the world
for software and hardware
Validated by
