Nozomi Networks shares research and tools to help ICS community defend against cyber threats
Nozomi Networks, the leader in industrial cyber security and operational visibility announced the launch of Nozomi Networks Labs.
Focused on helping defend the industrial systems that support everyday life, Nozomi Networks Labs will share its own research and collaborate with partners, peers, universities, government and institutional reseachers.
Its goal is to arm the ICS cyber security community with the information, tools and guidance necessary to reduce cyber threats to industrial and critical national infrastructure.
As an example of these efforts, Nozomi Networks also announced today that Radamsa has accepted and integrated a set of Nozomi Networks Labs code contributions that make it faster and easier to test the security of ICS device software with its open source fuzzing tool. The updated version of the tool is available now on GitLab.
“Today marks the formal launch and a more concentrated effort for Nozomi Networks Labs,” said Nozomi Networks Co-founder and CTO Moreno Carullo, “Over the last few years our researchers have participated in standards development, contributed more than a dozen responsible vulnerability disclosures, and delivered actionable research and tools on TRITON and GreyEnergy.”
Nozomi Networks Labs current and future programs include:
- ICS malware research and tools
- Responsible disclosure of ICS vulnerabilities
- Standards bodies participation
- ICS and IT expert staff support for Nozomi Networks client organizations
- Collaboration with partners on threat intelligence and ICS data analytics
- Support for and/or participation in ICS cyber security research conducted by universities, institutions and government bodies
- Peer collaboration on joint research initiatives with individual security researchers
“Research, community collaboration and giving back have always been part of Nozomi Networks’ DNA,” said Co-founder and Chief Product Officer Andrea Carcano. “Nozomi Networks Labs will allow us to make an even greater contribution to the ICS cyber security community.”