Security Experts:

long dotted


A researcher has found several critical vulnerabilities in the myPRO HMI/SCADA product made by mySCADA. [Read More]
More than 35,000 devices around the world, including many ICS and government systems, have been targeted with a new spyware dubbed PseudoManuscrypt. [Read More]
The agency urges critical infrastructure entities to better defend against malicious cyberattacks. [Read More]
Tel Aviv, Israel-based railway cybersecurity firm Cylus has raised $30 million in a Series B funding round, bringing the total raised so far to $57 million. [Read More]
Industrial organizations are exposed to Log4Shell attacks and there already are reports of active exploitation of the vulnerability. [Read More]
The volume of attacks on IoT and OT devices is increasing and in many cases these devices were specifically targeted, according to a new study commissioned by Microsoft. [Read More]
Industrial cybersecurity firm Claroty has raised $400 million in a Series E funding round, and it has entered an agreement to buy healthcare IoT security company Medigate. [Read More]
Enterprise device security company Armis has raised another $300 million, at a valuation of $3.4 billion. [Read More]
The company says it can detect anomalies within minutes through transforming big data into small data sets. [Read More]
Assurance and risk management firm DNV is acquiring industrial cybersecurity company Applied Risk in an effort to create an industrial cybersecurity powerhouse. [Read More]


rss icon

Galina Antova's picture
Under the leadership of Jen Easterly, CISA launch several key initiatives to significantly increase government collaboration among federal agencies as well as with the private sector.
Galina Antova's picture
What can defenders do in this new reality to strengthen the security posture of their OT environments? Here are five recommendations every CISO should consider.
Yaniv Vardi's picture
Critical infrastructure companies need to think of cybersecurity holistically, enabled by a single SOC to protect these once-separate environments in a holistic manner.
Yaniv Vardi's picture
If you’re a CISO or security leader, here are three questions to ask yourself as you consider this legislation and look to improve the security posture of your OT environment.
Yaniv Vardi's picture
Whether your company is assessing your existing capability to detect and respond to threats within your OT environment or considering new solutions, these three questions can help guide your evaluation:
Yaniv Vardi's picture
Wherever you are on your industrial cybersecurity journey, the important thing is to start strengthening cyber defenses and resilience now.
Gordon Lawson's picture
ICS operators need additional methods of obscuring their critical infrastructure from cyber security threats and tactics while allowing teams to more anonymously conduct incident detection and response.
Yaniv Vardi's picture
Adversaries are evolving their approaches and escalating attacks against industrial networks. They aren’t operating on our timelines, so we need to focus on what we can do next week and next month to reduce risk the most.
Yaniv Vardi's picture
Companies in the industrial space face unique challenges when it comes to revealing what needs to be secured.
Yaniv Vardi's picture
Proactive risk management requires being able to examine and address risk from different yet complementary perspectives to bring context to the overall security of an OT environment.