Security Experts:

long dotted


Malicious cyber actors pose a serious threat to Europe’s industrial infrastructure, with at least 10 hacker groups known to target European organizations. [Read More]
Vulnerabilities found in Yokogawa’s CENTUM and Exaopc control systems products can be exploited for disruption or manipulation of physical process controls. [Read More]
The FBI received 649 complaints of ransomware attacks targeting critical infrastructure organizations in 2021. [Read More]
The U.S. Government has formally charged four Russian hackers said to be working with a government intelligence agency over a series of high profile cyberattacks that targeted the energy industry in the United States and around the world between 2012 and 2018. [Read More]
A researcher has found more than 100 building controllers located in Russia that can be hacked remotely from the internet, but he claims his goal is not to cause damage. [Read More]
At least 30 vulnerabilities have been found in the past year in the DIAEnergie industrial energy management system made by Delta Electronics. [Read More]
The FBI is warning that it has seen increased interest by Russian hackers in energy companies since the start of Russia’s war against Ukraine, though it is offering no indication that a specific cyberattack is planned. [Read More]
Plants at iconic Massachusetts dairy company Hood LLC are back up and running after the company’s network system was the victim of a “cyber security event,” but some school districts are concerned that they will have a milk shortage as a result. [Read More]
NIST has released the final version of a special publication focusing on offering information and guidance to manufacturers for protecting ICS environments. [Read More]
The German subsidiary of Russian energy giant Rosneft has been hit by a cyberattack, the Federal Office for Information Security (BSI) said on Monday, with hacker group Anonymous claiming responsibility. [Read More]


rss icon

Galina Antova's picture
As digital transformation and cybersecurity become pillars that successful companies will build their futures on, the time has come to include CISOs and CIOs on company boards.
Matt Morris's picture
Companies must instill a culture of resilience in which security improvements are emphasized as a fundamental component of an organization’s individual corporate culture
Galina Antova's picture
Let’s learn from the previous examples of economic warfare and use the detailed observations and recommendations from NSA and CISA to protect OT networks to our advantage.
Galina Antova's picture
Three recommendations that can help foster acceptance for Digital transformation initiatives so that more companies can move quickly and drive business value.
Galina Antova's picture
With the right tools in place, IT and OT teams can work together, leveraging visibility and continuity across the attack surface to govern OT networks with the same processes and reporting metrics.
Galina Antova's picture
It’s very challenging for OT professionals to play catch up and close the 25+ year IT-OT security gap, particularly as the number of connectivity points grows exponentially.
Galina Antova's picture
When your core business operations, digital transformation initiatives and workers’ ability to do their jobs are at risk, effective OT security must become just as ubiquitous
Galina Antova's picture
Eliminate complexity, align IT and OT teams, and simplify governance are my top three recommendations for how to bridge the IT-OT security gap.
Galina Antova's picture
How to secure your OT network without trying to repurpose your IT playbook and eliminate complexity in the process.
Galina Antova's picture
As the size of the remote workforce surges, network administrators of operational technology (OT) networks find themselves on the front lines of enablement.