Security Experts:

long dotted


Johnson Controls has acquired Seattle-based Tempered Networks to help protect buildings from cyberattacks [Read More]
Industry professionals comment on the disclosure of OT:Icefall, a collection of 56 vulnerabilities affecting ICS products from 10 major companies. [Read More]
Forescout has identified a set of 56 vulnerabilities affecting devices from 10 operational technology (OT) vendors that are collectively calling OT:ICEFALL. [Read More]
Air raid sirens sounded in Israeli cities on Sunday and it appears they may have been triggered by hackers possibly operating out of Iran. [Read More]
AutomationDirect has patched several high-severity vulnerabilities in its PLC and HMI products. [Read More]
A survey conducted by Fortinet shows that over 40% of cybersecurity incidents at OT organizations resulted in operational outages that put physical safety at risk. [Read More]
ICS Patch Tuesday: Siemens and Schneider Electric have released a total of 22 advisories addressing more than 80 vulnerabilities affecting their products. [Read More]
Schneider Electric and Claroty have announced the launch of a new cybersecurity solution for buildings. [Read More]
Vulnerabilities in InfiRay thermal cameras can be exploited by hackers to tamper with industrial processes, including to disrupt production or create lower quality products. [Read More]
Dragos has launched OT-CERT, a new initiative to provide free industrial cybersecurity resources. [Read More]


rss icon

Galina Antova's picture
Over the last few years, the pandemic and work from home paradigm shift have accelerated the convergence of IT and OT networks and necessitated a consolidated strategy to address cyber risks across cyber-physical systems (CPS).
Landon Winkelvoss's picture
Fusion centers are able to converge cyber and physical security, close gaps in coverage, and scale security to protect facilities and hundreds of thousands of employees.
Galina Antova's picture
There are no easy solutions to close the operational technology (OT) cybersecurity talent gap, but here are few ideas to help you get started.
Galina Antova's picture
There are seven immediate steps you can take to put your organization on the path toward better situational awareness and risk reduction to protect critical infrastructure.
Galina Antova's picture
The biggest advantage defenders have as the nature of the conflict and strategies evolve, is to know their networks better than the adversary.
Galina Antova's picture
We must encourage the growth of research communities to help strengthen industrial cybersecurity, and we need to act fast.
Galina Antova's picture
Given the range and complexity of XIoT, it’s understandable that CISOs want to have a comprehensive view across all aspects and elements of their networks, spanning industrial, healthcare, and enterprise environments.
Galina Antova's picture
Under the leadership of Jen Easterly, CISA launch several key initiatives to significantly increase government collaboration among federal agencies as well as with the private sector.
Galina Antova's picture
What can defenders do in this new reality to strengthen the security posture of their OT environments? Here are five recommendations every CISO should consider.
Yaniv Vardi's picture
Critical infrastructure companies need to think of cybersecurity holistically, enabled by a single SOC to protect these once-separate environments in a holistic manner.