White papers
Honeywell Industrial Cybersecurity news
Honeywell released its 2024 USB Threat Report, which provides new insight into how “silent residency” is an increasing cyber threat for industrial and critical infrastructure facilities. In the report, Honeywell highlighted the growing risk of “living off the land” (“LotL”) attacks in which adversaries use USB devices to gain access to industrial control systems to hide and observe operations before launching attacks that evade detection and manipulate the ta...
Honeywell unveiled Honeywell Forge Performance+ for Aerospace, a cloud-based platform that utilizes AI and machine learning (ML) to help commercial aerospace manufacturing and maintenance, repair & overhaul (MRO) facilities modernize production and lower operational costs through digitalization. This addition to the Honeywell Forge suite further supports Honeywell’s alignment with the megatrends of advancing automation and the future of aviation. Complexity and operating costs...
Honeywell launched Cyber Watch, a breakthrough enterprise solution designed to help organizations better identify, mitigate, and manage the latest Operational Technology (OT) cyber threats. Stop before attack “Everyone from the plant manager to the CISO is a line of defense against the next cyberattack. No company wants to be a front-page headline as the next victim of a ransomware attack. We know hackers are lurking – waiting for months or even years – to strike,” said...
Honeywell Industrial Cybersecurity case studies
A major European oil and gas company that acquires, explores, produces and supplies chemical and petroleum products had a cybersecurity challenge. Company leadership wanted a better way to quantify and respond to the industry’s increasing levels of cybersecurity risk. Pioneers were looking for a new way to better understand and improve their company’s OT cybersecurity. As part of this effort, pioneers wanted to compare the company’s current levels of protection against a serie...
Cybersecurity threats targeting organizations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partners, like suppliers and vendors. Honeywell's customer, a global pharmaceutical company, realized that potential vulnerabilities like these might be in its partner ecosystem. Therefore, the pharmaceutical company wanted to get ahead of a potential breach so they trusted Honeywell to do a thorough assessment of its...
Hackers gain control of a chemical plant’s furnace control system. They tamper with the temperature settings and cause an explosion. The consequences of an incident like that can be catastrophic, especially since 9.3 million people reside within a 10-kilometer radius of the average chemical plant in the US. Targeting operational technology (OT) systems has become a typical tactic for bad actors. Cybercriminals and nation-state actors see these critical assets as an open invitation to disr...