Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Industrial cybersecurity firm Radiflow launches CIARA, an automated risk analysis platform for industrial systems. [Read More]
The official Call for Presentations (speakers) for SecurityWeek’s 2020 Industrial Control Systems (ICS) Cyber Security Conference has been extended to August 31st. [Read More]
The first entirely virtual edition of the Black Hat cybersecurity conference took place last week and researchers from tens of organizations presented the results of their work from the past year. [Read More]
Vulnerabilities found in protocol gateway devices can allow hackers targeting industrial systems to launch stealthy attacks. [Read More]
Researchers have described how a botnet powered by high-wattage IoT devices can manipulate the energy market. [Read More]
Researchers have developed a worm to demonstrate that design flaws and vulnerabilities in legacy programming languages can be leveraged by malicious actors to attack industrial robots. [Read More]
High-severity vulnerabilities found in Mitsubishi Electric factory automation products can be exploited to remotely attack industrial organizations. [Read More]
Vulnerabilities discovered in VPN products primarily used for remote access to industrial systems can allow hackers to gain access to ICS and possibly cause physical damage. [Read More]
The NSA and CISA have urged critical infrastructure operators in the United States to take measures to reduce the cyber exposure of industrial assets. [Read More]
The failure of organizations in Israel’s water sector to secure cellular routers made it possible for hackers to launch a second round of attacks on the country’s water facilities. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Galina Antova's picture
As digital transformation and cybersecurity become pillars that successful companies will build their futures on, the time has come to include CISOs and CIOs on company boards.
Matt Morris's picture
Companies must instill a culture of resilience in which security improvements are emphasized as a fundamental component of an organization’s individual corporate culture
Galina Antova's picture
Let’s learn from the previous examples of economic warfare and use the detailed observations and recommendations from NSA and CISA to protect OT networks to our advantage.
Galina Antova's picture
Three recommendations that can help foster acceptance for Digital transformation initiatives so that more companies can move quickly and drive business value.
Galina Antova's picture
With the right tools in place, IT and OT teams can work together, leveraging visibility and continuity across the attack surface to govern OT networks with the same processes and reporting metrics.
Galina Antova's picture
It’s very challenging for OT professionals to play catch up and close the 25+ year IT-OT security gap, particularly as the number of connectivity points grows exponentially.
Galina Antova's picture
When your core business operations, digital transformation initiatives and workers’ ability to do their jobs are at risk, effective OT security must become just as ubiquitous
Galina Antova's picture
Eliminate complexity, align IT and OT teams, and simplify governance are my top three recommendations for how to bridge the IT-OT security gap.
Galina Antova's picture
How to secure your OT network without trying to repurpose your IT playbook and eliminate complexity in the process.
Galina Antova's picture
As the size of the remote workforce surges, network administrators of operational technology (OT) networks find themselves on the front lines of enablement.