Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Honeywell study shows many industrial companies are slow to secure their data and operations against cyber threats [Read More]
Remaining competitive is the primary motivation for implementing a corporate 'internet of things' (IoT) strategy; but 90% of those doing so admit the implementation is struggling, according to a recent survey. [Read More]
No patch for critical vulnerability found in WAGO PLCs. Thousands of potentially affected devices connected to the Internet [Read More]
ICS-CERT provides solid advice on updating antiviruses in industrial control systems, but it’s not practical and organizations should not believe AVs are enough [Read More]
Israeli industrial cybersecurity startup SCADAfence has secured $10 million in funding through its recently announced Series A round. [Read More]
Siemens patches several vulnerabilities, including authentication bypass and DoS flaws, in SWT 3000 teleprotection product [Read More]
Siemens warns customers that the Dnsmasq vulnerabilities found recently by Google researchers affect some of its industrial communications products [Read More]
More vendors warn customers that their industrial communications products are vulnerable to the recently disclosed KRACK Wi-Fi attack [Read More]
Hundreds of Moxa devices similar to the ones targeted in the 2015 Ukraine power grid hack are vulnerable to remote attacks [Read More]
Authentication bypass and remote code execution flaws found in Siemens SICAM RTU. No patches available as product has been discontinued [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Galina Antova's picture
There is no more important mission in cybersecurity than securing the Industrial Control Systems networks that power our world and our lives.
Ashley Arbuckle's picture
Here are five recommendations that can help you, as an IT security professional, proactively work in partnership with your OT counterparts to protect the business better.
Jalal Bouhdada's picture
Everyone from bedroom hackers to state sponsored spies have wanted to breach critical systems since the dawn of the networked era, whether that be for monetary gain, secret information, or just pure curiosity.
Ashley Arbuckle's picture
The goal of IT/OT convergence is to make the OT side more resilient through effective cyber protections, and instill confidence in your board and senior executives.
Barak Perelman's picture
The successful deployment of industrial cybersecurity projects must leverage resources from both IT and OT.
Galina Antova's picture
Following these prescriptive steps can help do something about the state of security in your own ICS network environment.
David Holmes's picture
Manufacturers are currently experimenting with several possible methods to avoid default passwords, and your IoT project must consider the default password problem to be among the highest priority.
Galina Antova's picture
From the boardroom to the security operations center, lip service can no longer be paid to ICS/critical infrastructure/OT cybersecurity.
Ashley Arbuckle's picture
Segmentation is an important element of any security strategy to mitigate risk from IoT-based attacks, but it has to be done right.
Josh Lefkowitz's picture
Oil and gas is one of the critical infrastructure sectors that face greater risks and challenges when it comes to security