Security Experts:

long dotted


Industrial cybersecurity firm Dragos has identified seven threat groups that have targeted electric utilities in North America. [Read More]
Rockwell Automation will acquire Israel-based cybersecurity firm Avnet in an effort to expand its cybersecurity expertise. [Read More]
Cybersecurity professionals comment on the threat posed by Iran to critical infrastructure and industrial control systems (ICS) after the US killed Iranian general Qassem Soleimani. [Read More]
MITRE released a version of its ATT&CK knowledge base that is specifically designed for industrial control systems (ICS). [Read More]
Many cybersecurity experts believe Iran could respond with cyberattacks to the U.S. airstrike that killed Iranian general Qassem Soleimani. [Read More]
This presentation provides an insightful look at the current state of OT cybersecurity. It focuses on strategies owner operators and IT and OT security teams can use to cut through the noise. It also provides guidance on how to assess the current state of their program, what they should focus on in the next year, and what they should be prepared to achieve in the next 3-5 years. [Read More]
A cyber-espionage group has targeted hundreds of industrial companies in South Korea and other countries using malware designed to steal passwords and documents. [Read More]
Several critical vulnerabilities found by Cisco Talos researchers in a configuration service used by WAGO PLCs can be exploited remotely for arbitrary code execution and DoS attacks. [Read More]
Schneider Electric has patched vulnerabilities in Modicon controllers and several EcoStruxure products. [Read More]
FireEye unveils its Cyber Physical Threat Intelligence service, which provides organizations context, data and actionable analysis on threats targeting OT, ICS and IoT systems. [Read More]


rss icon

Barak Perelman's picture
While pharmaceutical operations networks were once siloed, today their connection to IT and anywhere access has created an environment that threatens the integrity of drug formulation control systems.
Barak Perelman's picture
Recycled cyber attacks may be a fairly new development in ICS security, but they have been a staple in IT environments for years.
Seema Haji's picture
Security is often the first place IT and OT teams meet. There are always kinks to iron out, and ensuring a strong security posture is paramount regardless of the teams involved.
Barak Perelman's picture
The same cloud technology that has exposed OT networks to external threats is now providing an alternative for protecting organizations when the physical deployment of OT security equipment is not practical.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Barak Perelman's picture
Since Building Management Systems (BMS) are integrated with and interconnected to both hardwired and cloud based solutions, as well as third party applications, their attack surface is large and getting larger.
Seema Haji's picture
As OT environments evolve, security is key to thwarting attacks with the potential to cause large and costly disruptions.
Jalal Bouhdada's picture
By deploying robots with cybersecurity in mind we can ensure that they don’t run the danger of introducing the same negative effects into their environment.
Seema Haji's picture
Failing to implement the right security controls could open the door for attacks and disruption that threatens system availability and performance — the very reasons for leveraging the power of IoT in the first place.