Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

A survey conducted by Ponemon and Tenable reveals that 90% of organizations that have OT infrastructure experienced at least one damaging cyberattack in the past two years. [Read More]
Updates released by Rockwell Automation for its Allen-Bradley Stratix industrial switches patch several DoS vulnerabilities introduced by the use of Cisco software. [Read More]
TXOne Networks, the IIoT security-focused joint venture between Trend Micro and Moxa, unveiled its first product, an industrial intrusion prevention system (IPS). [Read More]
A study conducted by Trend Micro shows that the manufacturing industry is exposed to a wide range of threats, in many cases due to long equipment life cycles. [Read More]
Critical and high severity code execution and DoS vulnerabilities have been found and patched in Advantech’s WebAccess SCADA software. [Read More]
SecurityWeek’s 2019 Singapore ICS Cyber Security Conference, the largest and longest-running cybersecurity event series for industrial sectors, will take place on April 16-18 at the Fairmont Singapore & Swissôtel The Stamford. [Read More]
Rockwell Automation’s Allen Bradley PowerFlex 525 AC drives are affected by a critical DoS vulnerability that allows hackers to gain control of devices. [Read More]
Shodan announces Monitor, a new service designed to help organizations keep track of systems connected to the Internet. [Read More]
Nearly half of the industrial control system (ICS) computers protected by Kaspersky were targeted by malware and other threats in 2018. [Read More]
Operations at two major US-based chemical companies, Hexion and Momentive, have been disrupted by a cyberattack reportedly involving LockerGoga, the ransomware that recently hit aluminum giant Norsk Hydro. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Galina Antova's picture
We’ve seen the discussion moving away from an active vs. passive debate to one seeking a more balanced approach that integrates the right mix of detection technologies.
Barak Perelman's picture
Just as internet security was a relative unknown concern 20 years ago, public awareness of threats to the electric grid, water supplies, etc. is mounting
Laurence Pitt's picture
By working together, IT and OT teams can ensure better security across the whole enterprise environment and that can only be good for business.
Seema Haji's picture
As industrial environments become more complex, data-type and data-source agnostic technologies need to be employed. Both IT and OT teams should be able to quickly access and analyze all data relevant to their needs.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.
Jalal Bouhdada's picture
The Secure Development Lifecycle (SDL) process is still notable by its absence in many new deployments of Industrial Internet of Things (IIoT) technologies.
Galina Antova's picture
The next year will surprise all of us in at least one way or another. How we deal with these surprises, both individually and collectively, will, in the end, define the next twelve months.
Justin Fier's picture
Against the ongoing backdrop of cyber conflict between nation states and escalating warnings from the Department of Homeland Security, critical infrastructure is becoming a central target for threat actors.
Jalal Bouhdada's picture
In the event of a cybersecurity incident in an industrial environment, you should follow a well-established seven step response process.