Security Experts:

long dotted


Railway wireless communication devices made by Moxa are affected by 60 vulnerabilities, including ones that could allow hackers to cause disruptions. [Read More]
The American Petroleum Institute (API) has published the third edition of its pipeline cybersecurity standard. [Read More]
An industrial energy management system made by Delta Electronics is affected by several vulnerabilities whose exploitation could have serious consequences. [Read More]
A study conducted by SANS shows that while OT organizations believe cyber risk is high, many of them are unsure if they have suffered a breach. [Read More]
A survey commissioned by Honeywell showed that a quarter of facility managers in the US, Germany and China have admitted suffering a breach of OT systems in the past year. [Read More]
More than 600 ICS vulnerabilities were disclosed in the first half of 2021, according to industrial cybersecurity firm Claroty. [Read More]
Siemens, Schneider Electric, Rockwell Automation and others have issued advisories in response to the discovery of the NicheStack vulnerabilities dubbed INFRA:HALT. [Read More]
A collection of vulnerabilities affecting multiple RTOSs and supporting libraries, BadAlloc could allow attackers to gain control of highly sensitive systems. [Read More]
Millions of IoT devices that use ThroughTek’s Kalay network are exposed to remote attacks due to a critical vulnerability. [Read More]
Siemens and Schneider Electric release 18 advisories addressing a total of more than 50 vulnerabilities affecting their products. [Read More]


rss icon

Yaniv Vardi's picture
Whether your company is assessing your existing capability to detect and respond to threats within your OT environment or considering new solutions, these three questions can help guide your evaluation:
Yaniv Vardi's picture
Wherever you are on your industrial cybersecurity journey, the important thing is to start strengthening cyber defenses and resilience now.
Gordon Lawson's picture
ICS operators need additional methods of obscuring their critical infrastructure from cyber security threats and tactics while allowing teams to more anonymously conduct incident detection and response.
Yaniv Vardi's picture
Adversaries are evolving their approaches and escalating attacks against industrial networks. They aren’t operating on our timelines, so we need to focus on what we can do next week and next month to reduce risk the most.
Yaniv Vardi's picture
Companies in the industrial space face unique challenges when it comes to revealing what needs to be secured.
Yaniv Vardi's picture
Proactive risk management requires being able to examine and address risk from different yet complementary perspectives to bring context to the overall security of an OT environment.
Yaniv Vardi's picture
As industrial cybersecurity rises to the top of priority lists for CISOs and their boards, we have an opportunity to think differently about industrial operations protection.
Yaniv Vardi's picture
The Swiss Army Knife approach helps ensure we’re prepared for many different situations and can act fast. It also makes sense for how we should approach industrial cybersecurity.
Yaniv Vardi's picture
The change we encountered in 2020 was unprecedented and had a dramatic impact on our operational technology (OT) environments – accelerating and sometimes recasting how we address the following four key areas.
Galina Antova's picture
Security teams need to able to identify and track threats that cross the IT/OT boundary, which means having access to IT/OT threat signatures for the ICS networks as well.