Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

New study from Dragos shows that non-targeted malware hits roughly 3,000 unique industrial sites a year and targeted ICS attacks are not so rare [Read More]
Schneider Electric patches serious vulnerabilities in Wonderware Intelligence and ClearSCADA products [Read More]
Bechtel has opened a new cyber security lab aimed at protecting industrial equipment and software that control facilities such as power plants, chemical plants, and other large-scale critical infrastructure operations. [Read More]
ICS-CERT informed organizations that Siemens and Schneider Electric patched high severity vulnerabilities in their products [Read More]
Siemens patches XSS and CSRF vulnerabilities in RUGGEDCOM network management system (NMS) [Read More]
Robots affected by vulnerabilities that can be exploited for spying, sensitive data theft, and even to cause physical harm or damage [Read More]
The U.S. oil and gas industry is not prepared to address OT cybersecurity risks, according to a Siemens study [Read More]
Researchers warn about the threat posed by logic bombs to industrial control systems (ICS), particularly programmable logic controllers (PLCs) [Read More]
Former sysadmin sentenced to 34 months in prison for hacking into systems of industrial facility and disrupting its operations [Read More]
Study conducted by Trend Micro shows the exposure of critical sectors and industrial systems in the United States [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Jim Ivers's picture
IoT promises a lot of convenience, but there is a price to be paid if you don’t involve the best connected device ever created—your brain.
Johnnie Konstantas's picture
To extend the capabilities of advanced cybersecurity tools at the centralized production environment, implementing an out-of-band transport network to get visibility into both packet data and syslog traffic can be very beneficial.
Tim Layton's picture
Based on existing intelligence, it is reasonable to assume that nation-states already possess all the information they need to launch such an attack on the U.S. power grid.
Jim Ivers's picture
What is missing from the conversation is how large a role software plays in the IoT equation. Plugging something into the Internet does not make it work -- it just makes it vulnerable.
Nate Kube's picture
Since the ratification of IEC 62443, updates to this international industrial controls standard have been published to move systems integration work forward.
Eduard Kovacs's picture
US intel chief warns that Russian hackers have been targeting critical infrastructure ICS. Security experts say the threat is real.
Nate Kube's picture
Manufacturing supply chains are vital to the development and fulfillment of any modern technology—they change rapidly and locations of suppliers change. This dynamic nature of the supply chain exposes enterprises to a wide variety of risks.
Nate Kube's picture
I would like the OT security community to move away from asking what can we do to gain greater adoption of a greenfield IT security model and instead ask how we can gain demonstrable gains in OT security posture more efficiently.
Torsten George's picture
The NIST Cybersecurity Framework is a good first step towards creating a standardized approach to cyber security, but requires many substantial updates before really improving our nation’s cyber resilience.
Marc Solomon's picture
The energy sector requires an approach to cybersecurity that doesn’t rely exclusively on air gaps or point-in-time detection tools but addresses the full attack continuum – before, during, and after an attack.