Security Experts:

long dotted


Zero trust is on track to being implemented in many OT environments, particularly in critical infrastructure organizations. [Read More]
A survey shows that some of the biggest cybersecurity problems related to OT involve people, specifically human error and a significant shortage of staff. [Read More]
A survey shows that while most organizations with IIoT/OT systems have experienced a security incident, impact is reduced when security projects have been implemented. [Read More]
Siemens and Schneider Electric have released their Patch Tuesday updates for July 2022 with a total of two dozen advisories describing 59 vulnerabilities. [Read More]
The call for presentations (CFP) for SecurityWeek's ICS Cyber Security Conference closes on July 15, 2022. [Read More]
As part of a campaign that started in March 2021, the threat actor targeted a telecoms company in Pakistan, as well as other organizations. [Read More]
The House of Representatives has passed the Industrial Control Systems Cybersecurity Training Act. [Read More]
Iran’s state-owned Khuzestan Steel Company was forced to halt production after being hit by a cyberattack, apparently marking one of the biggest such assaults on the country’s strategic industrial sector in recent memory. [Read More]
Codesys has patched nearly a dozen vulnerabilities, including critical flaws, that likely affect PLCs made by several ICS vendors. [Read More]
The ICS vendors whose products are affected by the OT:Icefall vulnerabilities have started releasing advisories. [Read More]


rss icon

Marie Hattar's picture
For Smart Cities to truly live up to their promise, we shouldn’t forget that – like all infrastructure – safety and security are a top priority.
Gordon Lawson's picture
The adoption of IoT technology used to connect SCADA systems to the internet either directly or indirectly dramatically increases the risk of a successful exploit.
Galina Antova's picture
Over the last few years, the pandemic and work from home paradigm shift have accelerated the convergence of IT and OT networks and necessitated a consolidated strategy to address cyber risks across cyber-physical systems (CPS).
Landon Winkelvoss's picture
Fusion centers are able to converge cyber and physical security, close gaps in coverage, and scale security to protect facilities and hundreds of thousands of employees.
Galina Antova's picture
There are no easy solutions to close the operational technology (OT) cybersecurity talent gap, but here are few ideas to help you get started.
Galina Antova's picture
There are seven immediate steps you can take to put your organization on the path toward better situational awareness and risk reduction to protect critical infrastructure.
Galina Antova's picture
The biggest advantage defenders have as the nature of the conflict and strategies evolve, is to know their networks better than the adversary.
Galina Antova's picture
We must encourage the growth of research communities to help strengthen industrial cybersecurity, and we need to act fast.
Galina Antova's picture
Given the range and complexity of XIoT, it’s understandable that CISOs want to have a comprehensive view across all aspects and elements of their networks, spanning industrial, healthcare, and enterprise environments.
Galina Antova's picture
Under the leadership of Jen Easterly, CISA launch several key initiatives to significantly increase government collaboration among federal agencies as well as with the private sector.