Security Experts:

ICS/OT
long dotted

NEWS & INDUSTRY UPDATES

Nine vulnerabilities, all with a CVSS score of 10, have been found in the FactoryTalk AssetCentre product from Rockwell Automation. [Read More]
The Biden administration has created an initiative aimed at helping critical industries, like the electric utility and water sectors, protect against damaging and destabilizing cyberattacks. [Read More]
Brewing giant Molson Coors said that a disruptive cyber attack, combined with winter storms in Texas, could cost the company upwards of $140 million in short-term EBITDA. [Read More]
Kaspersky says ransomware attacks on ICS devices decreased globally in the second half of 2020, but increased in developed countries. [Read More]
Vulnerabilities discovered recently in Weintek HMIs can give a remote hacker unlimited access to all functions of the HMI, which could have serious consequences. [Read More]
Researchers discovered several vulnerabilities in TBox RTUs from Ovarro that could be exploited for remote attacks against industrial organizations. [Read More]
The report details both the extent of risks and the scale of potential impact from cyber-attacks on the grid’s distribution systems. [Read More]
Several vulnerabilities were found in GE Universal Relay products and while some of them could pose a serious threat to organizations, exploitation is not easy. [Read More]
Molson Coors says said a cyberattack attack has caused delays and disruptions to parts of the business handling brewery operations, production, and shipments. [Read More]
Technical details disclosed for critical and high-severity code execution and DoS vulnerabilities affecting Schneider Electric PowerLogic smart meters. [Read More]

FEATURES, INSIGHTS // ICS/OT

rss icon

Yaniv Vardi's picture
Proactive risk management requires being able to examine and address risk from different yet complementary perspectives to bring context to the overall security of an OT environment.
Yaniv Vardi's picture
As industrial cybersecurity rises to the top of priority lists for CISOs and their boards, we have an opportunity to think differently about industrial operations protection.
Yaniv Vardi's picture
The Swiss Army Knife approach helps ensure we’re prepared for many different situations and can act fast. It also makes sense for how we should approach industrial cybersecurity.
Yaniv Vardi's picture
The change we encountered in 2020 was unprecedented and had a dramatic impact on our operational technology (OT) environments – accelerating and sometimes recasting how we address the following four key areas.
Galina Antova's picture
Security teams need to able to identify and track threats that cross the IT/OT boundary, which means having access to IT/OT threat signatures for the ICS networks as well.
Galina Antova's picture
In lock step with digital transformation projects, organizations are adopting the best practice of centralizing responsibility and accountability for securing the OT environment with the CISO.
Galina Antova's picture
How do we take what we’ve learned this year, capitalize on the change in mindset that it is possible to move fast, and apply it to seize the OT security opportunity in 2021?
Galina Antova's picture
As digital transformation and cybersecurity become pillars that successful companies will build their futures on, the time has come to include CISOs and CIOs on company boards.
Matt Morris's picture
Companies must instill a culture of resilience in which security improvements are emphasized as a fundamental component of an organization’s individual corporate culture
Galina Antova's picture
Let’s learn from the previous examples of economic warfare and use the detailed observations and recommendations from NSA and CISA to protect OT networks to our advantage.