Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Rockwell Automation is teaming up with industrial cybersecurity startup Claroty to combine their security products and services into future, packaged security offerings. [Read More]
ENISA has published a study on the "Communication network dependencies for ICS-SCADA Systems" to provide protection recommendations for ICS-SCADA systems against cyber threats. [Read More]
Honeywell has patched several critical and high severity vulnerabilities in its XL Web controllers [Read More]
Rapid7 adds hardware bridge to Metasploit framework - penetration testers can use it to analyze IoT hardware and software, ICS and SDR systems [Read More]
The official Call for Papers (presentations) for SecurityWeek's 2017 Singapore Industrial Control Systems (ICS) Cyber Security Conference, being held April 25–27 at the Fairmont Singapore is now open. [Read More]
Schneider Electric has released an update for its StruxureWare Data Center Expert product to address a vulnerability that exposes passwords [Read More]
Overhyped media reports can have a negative impact on ICS security, experts warn [Read More]
Ukraine’s national power company Ukrenergo has confirmed that the December outage was caused by a cyberattack [Read More]
Many critical infrastructure organizations have had their IT networks breached. Does that mean their control systems are also vulnerable to attacks? [Read More]
Carlo Gavazzi releases firmware updates for its VMU-C energy monitoring products to address critical vulnerabilities [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Ashley Arbuckle's picture
To support digital transformation, security protections must be tailored to fit the specific needs of operational technology (OT) and work in concert with IT security strategy.
Barak Perelman's picture
One of the biggest concerns, if these industrial threat predictions come true, is the likelihood of widespread collateral damage.
Barak Perelman's picture
Most industrial Control Systems (ICS) lack basic asset discovery and management capabilities common in IT networks.
Barak Perelman's picture
While many companies are concerned about cyber threats to their operations, most do not understand the difference between data plane and control plane protocols.
Barak Perelman's picture
Securing ICS networks is an extremely challenging task, as they lack many of the threat monitoring, detection, and response capabilities commonly found in IT infrastructures.
Barak Perelman's picture
To protect against external threats, malicious insiders and human error, industrial organizations must monitor all activities - whether executed by an unknown source or a trusted insider.
Barak Perelman's picture
The single biggest roadblock to ICS security today is the lack the visibility and control into activity that is occurring at the control layer, namely access and changes made to industrial control devices.
Jim Ivers's picture
IoT promises a lot of convenience, but there is a price to be paid if you don’t involve the best connected device ever created—your brain.
Johnnie Konstantas's picture
To extend the capabilities of advanced cybersecurity tools at the centralized production environment, implementing an out-of-band transport network to get visibility into both packet data and syslog traffic can be very beneficial.
Tim Layton's picture
Based on existing intelligence, it is reasonable to assume that nation-states already possess all the information they need to launch such an attack on the U.S. power grid.