Security Experts:

long dotted


Mysterious cybercrime group has targeted industrial organizations in Europe, Asia and North America as part of an information theft campaign. [Read More]
A critical authentication bypass vulnerability can be exploited by hackers to remotely compromise Rockwell controllers. [Read More]
There are a total of 15 threat groups that have targeted industrial organizations, including four added to the list in 2020. [Read More]
The U.S. government’s cybersecurity agency is pleading with critical infrastructure defenders to rip-and-replace Windows 7 from their networks as a matter of urgency. [Read More]
Industry professionals comment on recent hacker attack targeting a Florida city’s water supply. [Read More]
Siemens patches 21 more vulnerabilities related to processing specially crafted files in its product development solutions. [Read More]
A hacker’s attempt to poison the water supply of a small Florida city is raising alarms about just how vulnerable the nation’s water systems may be to attacks by more sophisticated intruders. [Read More]
An unknown hacker accessed the city’s water control systems in Oldsmar, Florida and increased sodium hydroxide to dangerous levels. [Read More]
Industrial cybersecurity firm OTORIO releases an open source tool designed to help organizations secure GE CIMPLICITY HMI/SCADA systems. [Read More]
The number of ICS vulnerabilities disclosed in 2020 increased by 25% compared to 2019 and 30% compared to 2018, Claroty reports. [Read More]


rss icon

Galina Antova's picture
Three recommendations that can help foster acceptance for Digital transformation initiatives so that more companies can move quickly and drive business value.
Galina Antova's picture
With the right tools in place, IT and OT teams can work together, leveraging visibility and continuity across the attack surface to govern OT networks with the same processes and reporting metrics.
Galina Antova's picture
It’s very challenging for OT professionals to play catch up and close the 25+ year IT-OT security gap, particularly as the number of connectivity points grows exponentially.
Galina Antova's picture
When your core business operations, digital transformation initiatives and workers’ ability to do their jobs are at risk, effective OT security must become just as ubiquitous
Galina Antova's picture
Eliminate complexity, align IT and OT teams, and simplify governance are my top three recommendations for how to bridge the IT-OT security gap.
Galina Antova's picture
How to secure your OT network without trying to repurpose your IT playbook and eliminate complexity in the process.
Galina Antova's picture
As the size of the remote workforce surges, network administrators of operational technology (OT) networks find themselves on the front lines of enablement.
Galina Antova's picture
Adversaries can enter through IT networks and remain undetected within an OT environment for months or even years, looking for subtle ways to undermine operations and create havoc.
Galina Antova's picture
We are at a stage where adversaries regularly operate below the threshold of armed conflict, using their powerful warcraft for economic and political advantage while maintaining plausible deniability.
Barak Perelman's picture
While pharmaceutical operations networks were once siloed, today their connection to IT and anywhere access has created an environment that threatens the integrity of drug formulation control systems.