Security Experts:

long dotted


The first round of security advisories released by Siemens and Schneider Electric in 2022 address a total of 40 vulnerabilities. [Read More]
Honeywell has teamed up with Acalvio to launch the Honeywell Threat Defense Platform (HTDP), a new OT cybersecurity solution for commercial buildings. [Read More]
Researchers have analyzed 16 URL parsing libraries and showed how inconsistencies can lead to various types of vulnerabilities. [Read More]
SecurityWeek has compiled a list of the advisories published by ICS and other industrial-related vendors in response to the recent Log4j vulnerabilities. [Read More]
Schneider Electric has patched several new vulnerabilities that expose its EVlink electric vehicle charging stations to remote hacking. [Read More]
A researcher has found several critical vulnerabilities in the myPRO HMI/SCADA product made by mySCADA. [Read More]
More than 35,000 devices around the world, including many ICS and government systems, have been targeted with a new spyware dubbed PseudoManuscrypt. [Read More]
The agency urges critical infrastructure entities to better defend against malicious cyberattacks. [Read More]
Tel Aviv, Israel-based railway cybersecurity firm Cylus has raised $30 million in a Series B funding round, bringing the total raised so far to $57 million. [Read More]
Industrial organizations are exposed to Log4Shell attacks and there already are reports of active exploitation of the vulnerability. [Read More]


rss icon

Galina Antova's picture
Under the leadership of Jen Easterly, CISA launch several key initiatives to significantly increase government collaboration among federal agencies as well as with the private sector.
Galina Antova's picture
What can defenders do in this new reality to strengthen the security posture of their OT environments? Here are five recommendations every CISO should consider.
Yaniv Vardi's picture
Critical infrastructure companies need to think of cybersecurity holistically, enabled by a single SOC to protect these once-separate environments in a holistic manner.
Yaniv Vardi's picture
If you’re a CISO or security leader, here are three questions to ask yourself as you consider this legislation and look to improve the security posture of your OT environment.
Yaniv Vardi's picture
Whether your company is assessing your existing capability to detect and respond to threats within your OT environment or considering new solutions, these three questions can help guide your evaluation:
Yaniv Vardi's picture
Wherever you are on your industrial cybersecurity journey, the important thing is to start strengthening cyber defenses and resilience now.
Gordon Lawson's picture
ICS operators need additional methods of obscuring their critical infrastructure from cyber security threats and tactics while allowing teams to more anonymously conduct incident detection and response.
Yaniv Vardi's picture
Adversaries are evolving their approaches and escalating attacks against industrial networks. They aren’t operating on our timelines, so we need to focus on what we can do next week and next month to reduce risk the most.
Yaniv Vardi's picture
Companies in the industrial space face unique challenges when it comes to revealing what needs to be secured.
Yaniv Vardi's picture
Proactive risk management requires being able to examine and address risk from different yet complementary perspectives to bring context to the overall security of an OT environment.