Security Experts:

long dotted


The company says it can detect anomalies within minutes through transforming big data into small data sets. [Read More]
Assurance and risk management firm DNV is acquiring industrial cybersecurity company Applied Risk in an effort to create an industrial cybersecurity powerhouse. [Read More]
Many critical and high-severity vulnerabilities have been found by Cisco Talos in a Lantronix Wi-Fi module designed for critical industrial and commercial applications. [Read More]
Researchers have shown that a widely used protocol named Data Distribution Service (DDS) is affected by vulnerabilities that could be exploited by threat actors for various purposes. [Read More]
An 18-month research project named Project Memoria has resulted in the discovery of nearly 100 vulnerabilities across 14 TCP/IP stacks. [Read More]
A report shows that the average cost of an ICS/OT cybersecurity incident is $3 million and some companies reported costs of over $100 million. [Read More]
Siemens and Schneider Electric have released a total of 20 Patch Tuesday advisories to address more than 50 vulnerabilities affecting their products. [Read More]
The newly identified vulnerabilities likely affect numerous safety-critical devices, such as patient monitors and other healthcare systems. [Read More]
Dragos has become the first industrial cybersecurity unicorn — with a valuation of $1.7 billion — after raising $200 million in Series D funding. [Read More]
Fuji Electric has patched half a dozen vulnerabilities in its Tellus factory monitoring and operating software. [Read More]


rss icon

Yaniv Vardi's picture
As industrial cybersecurity rises to the top of priority lists for CISOs and their boards, we have an opportunity to think differently about industrial operations protection.
Yaniv Vardi's picture
The Swiss Army Knife approach helps ensure we’re prepared for many different situations and can act fast. It also makes sense for how we should approach industrial cybersecurity.
Yaniv Vardi's picture
The change we encountered in 2020 was unprecedented and had a dramatic impact on our operational technology (OT) environments – accelerating and sometimes recasting how we address the following four key areas.
Galina Antova's picture
Security teams need to able to identify and track threats that cross the IT/OT boundary, which means having access to IT/OT threat signatures for the ICS networks as well.
Galina Antova's picture
In lock step with digital transformation projects, organizations are adopting the best practice of centralizing responsibility and accountability for securing the OT environment with the CISO.
Galina Antova's picture
How do we take what we’ve learned this year, capitalize on the change in mindset that it is possible to move fast, and apply it to seize the OT security opportunity in 2021?
Galina Antova's picture
As digital transformation and cybersecurity become pillars that successful companies will build their futures on, the time has come to include CISOs and CIOs on company boards.
Matt Morris's picture
Companies must instill a culture of resilience in which security improvements are emphasized as a fundamental component of an organization’s individual corporate culture
Galina Antova's picture
Let’s learn from the previous examples of economic warfare and use the detailed observations and recommendations from NSA and CISA to protect OT networks to our advantage.
Galina Antova's picture
Three recommendations that can help foster acceptance for Digital transformation initiatives so that more companies can move quickly and drive business value.