Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Honeywell announced recently that it has added several new features to its Forge cybersecurity platform. [Read More]
Siemens this week announced that it is acquiring UltraSoC Technologies, a provider of analytics and monitoring solutions for SoCs. [Read More]
Foreign hackers are taking advantage of the coronavirus pandemic to undermine institutions and threaten critical infrastructure, a top U.S. military cyber official said Thursday, June 25, 2020. [Read More]
Mitsubishi Electric and its subsidiary ICONICS have released patches for the vulnerabilities disclosed earlier this year at the Pwn2Own hacking competition targeting ICS. [Read More]
Microsoft has acquired industrial cybersecurity company CyberX in an effort to expand its Azure IoT security capabilities and extend them to IIoT and OT. [Read More]
A stored XSS vulnerability in OSIsoft PI System, a product often present in critical infrastructure facilities, can be exploited for phishing, privilege escalation and other purposes. [Read More]
Millions of IoT devices, including ones made by some of the world’s largest tech companies, are exposed to remote attacks due to vulnerabilities found in the Treck TCP/IP stack. [Read More]
Australian beverages giant Lion says its systems have been infected with a piece of ransomware that disrupted manufacturing processes and customer service. [Read More]
Critical vulnerabilities found by Cisco researchers expose Siemens’ LOGO! controllers to remote DoS and other attacks. [Read More]
AI company SparkCognition and German industrial giant Siemens have teamed up to offer an industrial security solution for energy companies. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Galina Antova's picture
With the right tools in place, IT and OT teams can work together, leveraging visibility and continuity across the attack surface to govern OT networks with the same processes and reporting metrics.
Galina Antova's picture
It’s very challenging for OT professionals to play catch up and close the 25+ year IT-OT security gap, particularly as the number of connectivity points grows exponentially.
Galina Antova's picture
When your core business operations, digital transformation initiatives and workers’ ability to do their jobs are at risk, effective OT security must become just as ubiquitous
Galina Antova's picture
Eliminate complexity, align IT and OT teams, and simplify governance are my top three recommendations for how to bridge the IT-OT security gap.
Galina Antova's picture
How to secure your OT network without trying to repurpose your IT playbook and eliminate complexity in the process.
Galina Antova's picture
As the size of the remote workforce surges, network administrators of operational technology (OT) networks find themselves on the front lines of enablement.
Galina Antova's picture
Adversaries can enter through IT networks and remain undetected within an OT environment for months or even years, looking for subtle ways to undermine operations and create havoc.
Galina Antova's picture
We are at a stage where adversaries regularly operate below the threshold of armed conflict, using their powerful warcraft for economic and political advantage while maintaining plausible deniability.
Barak Perelman's picture
While pharmaceutical operations networks were once siloed, today their connection to IT and anywhere access has created an environment that threatens the integrity of drug formulation control systems.
Barak Perelman's picture
Recycled cyber attacks may be a fairly new development in ICS security, but they have been a staple in IT environments for years.