Security Experts:

long dotted


An 18-month research project named Project Memoria has resulted in the discovery of nearly 100 vulnerabilities across 14 TCP/IP stacks. [Read More]
A report shows that the average cost of an ICS/OT cybersecurity incident is $3 million and some companies reported costs of over $100 million. [Read More]
Siemens and Schneider Electric have released a total of 20 Patch Tuesday advisories to address more than 50 vulnerabilities affecting their products. [Read More]
The newly identified vulnerabilities likely affect numerous safety-critical devices, such as patient monitors and other healthcare systems. [Read More]
Dragos has become the first industrial cybersecurity unicorn — with a valuation of $1.7 billion — after raising $200 million in Series D funding. [Read More]
Fuji Electric has patched half a dozen vulnerabilities in its Tellus factory monitoring and operating software. [Read More]
One-third of the attacks launched in 2021 against OT organizations involved ransomware, and of all the threat actors that use ransomware, Ryuk operators in particular appear to gravitate towards ICS networks. [Read More]
Iranian authorities on blamed a mysterious cyberattack for unprecedented disruption to the country's fuel distribution network. [Read More]
Wyatt Travnichek logged into the Post Rock Rural Water District system remotely, shut down the plant and turned off a filter. [Read More]
A total of 17 types of vulnerabilities have been found in the Versiondog data management product made by AUVESY. [Read More]


rss icon

Yaniv Vardi's picture
If you’re a CISO or security leader, here are three questions to ask yourself as you consider this legislation and look to improve the security posture of your OT environment.
Yaniv Vardi's picture
Whether your company is assessing your existing capability to detect and respond to threats within your OT environment or considering new solutions, these three questions can help guide your evaluation:
Yaniv Vardi's picture
Wherever you are on your industrial cybersecurity journey, the important thing is to start strengthening cyber defenses and resilience now.
Gordon Lawson's picture
ICS operators need additional methods of obscuring their critical infrastructure from cyber security threats and tactics while allowing teams to more anonymously conduct incident detection and response.
Yaniv Vardi's picture
Adversaries are evolving their approaches and escalating attacks against industrial networks. They aren’t operating on our timelines, so we need to focus on what we can do next week and next month to reduce risk the most.
Yaniv Vardi's picture
Companies in the industrial space face unique challenges when it comes to revealing what needs to be secured.
Yaniv Vardi's picture
Proactive risk management requires being able to examine and address risk from different yet complementary perspectives to bring context to the overall security of an OT environment.
Yaniv Vardi's picture
As industrial cybersecurity rises to the top of priority lists for CISOs and their boards, we have an opportunity to think differently about industrial operations protection.
Yaniv Vardi's picture
The Swiss Army Knife approach helps ensure we’re prepared for many different situations and can act fast. It also makes sense for how we should approach industrial cybersecurity.
Yaniv Vardi's picture
The change we encountered in 2020 was unprecedented and had a dramatic impact on our operational technology (OT) environments – accelerating and sometimes recasting how we address the following four key areas.