The Claroty Blog

Recent Posts

Understanding and Defending Against OT Supply Chain Risk

| Dave Weinstein

Oftentimes, when we think about mitigating cyber threats to industrial networks, we focus on preventing attackers from exploiting industrial...

Read More>>

New Research Illuminates Global Perspective on Industrial Cybersecurity

| Claroty Team

For CISOs tasked with safeguarding industrial networks, understanding IT security professionals’ attitudes, perceptions, and concerns regarding...

Read More>>

Debunking OT Security

| Dave Weinstein

Effective operational technology (OT) security is a necessity for industrial enterprises, critical infrastructure operators, and the countless...

Read More>>

SMB Attacks a Persistent Challenge for OT Networks

| Lior Hammer

Recent reporting on Lemon Duck, a new malware campaign targeting global manufacturers, is among the latest reminders of an enduring facet of the...

Read More>>

UPDATED: Advisory: New "Wormable" Vulnerability in Microsoft SMBv3 (CVE-2020-0796)

| Claroty Research

Updated at 13:00 ET on March 11, 2020The Claroty Research team has built a repository with tools (such as NSE script) to detect potentially...

Read More>>

COVID-19 Highlights Importance of Remote Access Management

| Dave Weinstein

As community spread of the Novel Coronavirus, or COVID-19, grows, businesses and governments around the globe are taking proactive measures to...

Read More>>

Announcing the Claroty and Demisto Cortex XSOAR Integration

| Claroty Team

With cybersecurity teams requiring greater visibility into their operational technology (OT) networks, integrations that connect information...

Read More>>

Claroty discovers new vulnerability related to Industroyer malware

| Nadav Erez

As part of Claroty’s continued mission and focus to support and secure critical infrastructure, researcher Tal Keren has discovered a...

Read More>>

Three reasons why CISOs should focus on OT security at RSA Conference

| Claroty Team

The convergence of IT and OT networks is creating greater urgency to bridge the IT/OT security gap. While convergence unlocks business value in...

Read More>>

Digging Deeper into Snake Ransomware and ICS Impact

| Rotem Mesika & Roi Shaubi

Despite widespread reporting that Snake, or EKANS, ransomware—which was discovered last month and allegedly created by Iran—aims to disrupt...

Read More>>

The Claroty Blog

Subscribe to the Blog