Security Experts:

long dotted


ICS and other vendors have published advisories to address serious DoS vulnerabilities affecting a widely used licensing and DRM solution from Wibu-Systems. [Read More]
More than a dozen vulnerabilities, collectively named INFRA:HALT, have been identified in the NicheStack TCP/IP stack, which is used by many OT device vendors. [Read More]
The connected device security provider plans to use the funds to scale and better meet market demand. [Read More]
Nozomi Networks, a provider of operational technology (OT) and internet of things (IoT) cybersecurity solutions, has raised $100 million in Series D pre-IPO-funding round. [Read More]
Classified files apparently leaked from an Iranian cyber unit show that the country is looking to improve its offensive cyber capabilities, including against ICS. [Read More]
Security researchers have stumbled upon a hitherto unknown data-wiping malware that was part of a disruptive cyberattack against Iran’s train system earlier this month. [Read More]
The Biden administration is eyeing ways to harden cybersecurity defenses for critical infrastructure. It's announcing Wednesday the development of performance goals and a voluntary public-private partnership to protect core sectors. [Read More]
A dozen vulnerabilities, including many rated critical or high severity, have been patched in CODESYS products, and Cisco Talos has disclosed the details of some flaws. [Read More]
The U.S. House of Representatives this week passed several cybersecurity bills, including ones related to funding for state and local governments, critical infrastructure, and ICS. [Read More]
Industrial cybersecurity company SynSaber launches with $2.5 million in seed funding. [Read More]


rss icon

Galina Antova's picture
How to secure your OT network without trying to repurpose your IT playbook and eliminate complexity in the process.
Galina Antova's picture
As the size of the remote workforce surges, network administrators of operational technology (OT) networks find themselves on the front lines of enablement.
Galina Antova's picture
Adversaries can enter through IT networks and remain undetected within an OT environment for months or even years, looking for subtle ways to undermine operations and create havoc.
Galina Antova's picture
We are at a stage where adversaries regularly operate below the threshold of armed conflict, using their powerful warcraft for economic and political advantage while maintaining plausible deniability.
Barak Perelman's picture
While pharmaceutical operations networks were once siloed, today their connection to IT and anywhere access has created an environment that threatens the integrity of drug formulation control systems.
Barak Perelman's picture
Recycled cyber attacks may be a fairly new development in ICS security, but they have been a staple in IT environments for years.
Seema Haji's picture
Security is often the first place IT and OT teams meet. There are always kinks to iron out, and ensuring a strong security posture is paramount regardless of the teams involved.
Barak Perelman's picture
The same cloud technology that has exposed OT networks to external threats is now providing an alternative for protecting organizations when the physical deployment of OT security equipment is not practical.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.