Security Experts:

long dotted


Vulnerabilities affecting a widely used distributed control system (DCS) from Honeywell can allow malicious actors to disrupt industrial processes. [Read More]
SecurityWeek has reached out to several companies that offer products and solutions designed for protecting industrial control systems (ICS) against cyber threats, and asked their experts to share some interesting stories from the field. [Read More]
The Department of Energy has contracted with Xage, a zero-trust access provider, to expand its existing Xage Fabric application to provide secure and controlled access to emergency responders. [Read More]
Researchers have discovered nearly a dozen vulnerabilities in widely used network management products from Nagios. [Read More]
Attackers could use crafted .dbf files to trigger the bug on the victim’s machine to run arbitrary code. [Read More]
September 2021 ICS Patch Tuesday - Siemens and Schneider Electric release 25 advisories to address a total of more than 40 vulnerabilities. [Read More]
Belarus and Ukraine saw the largest increase in ICS attacks during the first half of 2021, but it’s unclear if the attacks are linked to the political situation in the area. [Read More]
After remaking security procedures following the 9/11 attacks, carriers are now faced with rising threats targeting computers and electronic equipment critical to their operations and safety. [Read More]
Railway wireless communication devices made by Moxa are affected by 60 vulnerabilities, including ones that could allow hackers to cause disruptions. [Read More]
The American Petroleum Institute (API) has published the third edition of its pipeline cybersecurity standard. [Read More]


rss icon

Yaniv Vardi's picture
Whether your company is assessing your existing capability to detect and respond to threats within your OT environment or considering new solutions, these three questions can help guide your evaluation:
Yaniv Vardi's picture
Wherever you are on your industrial cybersecurity journey, the important thing is to start strengthening cyber defenses and resilience now.
Gordon Lawson's picture
ICS operators need additional methods of obscuring their critical infrastructure from cyber security threats and tactics while allowing teams to more anonymously conduct incident detection and response.
Yaniv Vardi's picture
Adversaries are evolving their approaches and escalating attacks against industrial networks. They aren’t operating on our timelines, so we need to focus on what we can do next week and next month to reduce risk the most.
Yaniv Vardi's picture
Companies in the industrial space face unique challenges when it comes to revealing what needs to be secured.
Yaniv Vardi's picture
Proactive risk management requires being able to examine and address risk from different yet complementary perspectives to bring context to the overall security of an OT environment.
Yaniv Vardi's picture
As industrial cybersecurity rises to the top of priority lists for CISOs and their boards, we have an opportunity to think differently about industrial operations protection.
Yaniv Vardi's picture
The Swiss Army Knife approach helps ensure we’re prepared for many different situations and can act fast. It also makes sense for how we should approach industrial cybersecurity.
Yaniv Vardi's picture
The change we encountered in 2020 was unprecedented and had a dramatic impact on our operational technology (OT) environments – accelerating and sometimes recasting how we address the following four key areas.
Galina Antova's picture
Security teams need to able to identify and track threats that cross the IT/OT boundary, which means having access to IT/OT threat signatures for the ICS networks as well.