Security Experts:

long dotted


The U.S government is sounding a loud alarm after discovering new custom tools capable of full system compromise and disruption of ICS/SCADA devices and servers. [Read More]
ABB is working on patches for several high-severity DoS vulnerabilities affecting network interface modules for control hardware. [Read More]
Schneider Electric and Siemens have patched critical vulnerabilities in industrial and energy management products. [Read More]
Ukrainians say Russian hackers succeeded in penetrating and disrupting the industrial control system of one power station, but defenders were able to thwart any power loss. [Read More]
Honeywell, Claroty, Nozomi and Forescout have teamed up to create the Operational Technology Cybersecurity Coalition. [Read More]
An energy facility in Ukraine was recently targeted with Industroyer2, a Russia-linked piece of malware designed to target ICS. [Read More]
India says it foiled an cyberattack by Chinese hackers targeting its power distribution system near a disputed frontier where the two countries are engaged in a military stand-off. [Read More]
Malicious cyber actors pose a serious threat to Europe’s industrial infrastructure, with at least 10 hacker groups known to target European organizations. [Read More]
Vulnerabilities found in Yokogawa’s CENTUM and Exaopc control systems products can be exploited for disruption or manipulation of physical process controls. [Read More]
The FBI received 649 complaints of ransomware attacks targeting critical infrastructure organizations in 2021. [Read More]


rss icon

Gordon Lawson's picture
ICS operators need additional methods of obscuring their critical infrastructure from cyber security threats and tactics while allowing teams to more anonymously conduct incident detection and response.
Yaniv Vardi's picture
Adversaries are evolving their approaches and escalating attacks against industrial networks. They aren’t operating on our timelines, so we need to focus on what we can do next week and next month to reduce risk the most.
Yaniv Vardi's picture
Companies in the industrial space face unique challenges when it comes to revealing what needs to be secured.
Yaniv Vardi's picture
Proactive risk management requires being able to examine and address risk from different yet complementary perspectives to bring context to the overall security of an OT environment.
Yaniv Vardi's picture
As industrial cybersecurity rises to the top of priority lists for CISOs and their boards, we have an opportunity to think differently about industrial operations protection.
Yaniv Vardi's picture
The Swiss Army Knife approach helps ensure we’re prepared for many different situations and can act fast. It also makes sense for how we should approach industrial cybersecurity.
Yaniv Vardi's picture
The change we encountered in 2020 was unprecedented and had a dramatic impact on our operational technology (OT) environments – accelerating and sometimes recasting how we address the following four key areas.
Galina Antova's picture
Security teams need to able to identify and track threats that cross the IT/OT boundary, which means having access to IT/OT threat signatures for the ICS networks as well.
Galina Antova's picture
In lock step with digital transformation projects, organizations are adopting the best practice of centralizing responsibility and accountability for securing the OT environment with the CISO.
Galina Antova's picture
How do we take what we’ve learned this year, capitalize on the change in mindset that it is possible to move fast, and apply it to seize the OT security opportunity in 2021?