Security Experts:

long dotted


Industrial cybersecurity company SIGA has raised $8.1 million in a Series B funding round, which brings the total raised by the firm to $15 million. [Read More]
An analysis of public ICS exploits can help defenders determine which vulnerabilities should be prioritized for remediation or mitigation. [Read More]
ICS and other vendors have published advisories to address serious DoS vulnerabilities affecting a widely used licensing and DRM solution from Wibu-Systems. [Read More]
More than a dozen vulnerabilities, collectively named INFRA:HALT, have been identified in the NicheStack TCP/IP stack, which is used by many OT device vendors. [Read More]
The connected device security provider plans to use the funds to scale and better meet market demand. [Read More]
Nozomi Networks, a provider of operational technology (OT) and internet of things (IoT) cybersecurity solutions, has raised $100 million in Series D pre-IPO-funding round. [Read More]
Classified files apparently leaked from an Iranian cyber unit show that the country is looking to improve its offensive cyber capabilities, including against ICS. [Read More]
Security researchers have stumbled upon a hitherto unknown data-wiping malware that was part of a disruptive cyberattack against Iran’s train system earlier this month. [Read More]
The Biden administration is eyeing ways to harden cybersecurity defenses for critical infrastructure. It's announcing Wednesday the development of performance goals and a voluntary public-private partnership to protect core sectors. [Read More]
A dozen vulnerabilities, including many rated critical or high severity, have been patched in CODESYS products, and Cisco Talos has disclosed the details of some flaws. [Read More]


rss icon

Galina Antova's picture
In lock step with digital transformation projects, organizations are adopting the best practice of centralizing responsibility and accountability for securing the OT environment with the CISO.
Galina Antova's picture
How do we take what we’ve learned this year, capitalize on the change in mindset that it is possible to move fast, and apply it to seize the OT security opportunity in 2021?
Galina Antova's picture
As digital transformation and cybersecurity become pillars that successful companies will build their futures on, the time has come to include CISOs and CIOs on company boards.
Matt Morris's picture
Companies must instill a culture of resilience in which security improvements are emphasized as a fundamental component of an organization’s individual corporate culture
Galina Antova's picture
Let’s learn from the previous examples of economic warfare and use the detailed observations and recommendations from NSA and CISA to protect OT networks to our advantage.
Galina Antova's picture
Three recommendations that can help foster acceptance for Digital transformation initiatives so that more companies can move quickly and drive business value.
Galina Antova's picture
With the right tools in place, IT and OT teams can work together, leveraging visibility and continuity across the attack surface to govern OT networks with the same processes and reporting metrics.
Galina Antova's picture
It’s very challenging for OT professionals to play catch up and close the 25+ year IT-OT security gap, particularly as the number of connectivity points grows exponentially.
Galina Antova's picture
When your core business operations, digital transformation initiatives and workers’ ability to do their jobs are at risk, effective OT security must become just as ubiquitous
Galina Antova's picture
Eliminate complexity, align IT and OT teams, and simplify governance are my top three recommendations for how to bridge the IT-OT security gap.