Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

A researcher has developed and open source intelligence (OSINT) to show how easy it is for adversaries to gather intelligence on critical infrastructure in the United States. [Read More]
Attackers using the Adwind remote access Trojan (RAT) are targeting petroleum firms in the United States in a recent campaign. [Read More]
The Urgent/11 vulnerabilities confirmed to impact other RTOS, which means more industrial and medical devices are affected than previously thought. [Read More]
SecurityWeek will offer an Advanced ICS/SCADA Hacking Training program at its 2019 Industrial Control Systems (ICS) Cyber Security Conference in Atlanta. [Read More]
The Cyber Security Agency of Singapore (CSA) has published the country’s Operational Technology Cybersecurity Masterplan. [Read More]
Tridium Niagara products are affected by a couple of vulnerabilities in BlackBerry QNX, including one that could allow an attacker to access sensitive information. [Read More]
A new report from the United States Government Accountability Office (GAO) shows that the Department of Energy (DOE) has yet to fully analyze the electric grid cybersecurity risks. [Read More]
Honeywell introduces the Forge Cybersecurity Platform, a solution designed to help industrial organizations protect OT and IIoT assets. [Read More]
Critical infrastructure and other organizations are increasingly at risk of being targeted in attacks involving RDP and disruptive ransomware. [Read More]
Kaspersky announces the ICS Vulnerabilities Database, a new service that provides information on vulnerabilities in ICS/IIoT products and ICS threat signatures. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Barak Perelman's picture
Recycled cyber attacks may be a fairly new development in ICS security, but they have been a staple in IT environments for years.
Seema Haji's picture
Security is often the first place IT and OT teams meet. There are always kinks to iron out, and ensuring a strong security posture is paramount regardless of the teams involved.
Barak Perelman's picture
The same cloud technology that has exposed OT networks to external threats is now providing an alternative for protecting organizations when the physical deployment of OT security equipment is not practical.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Barak Perelman's picture
Since Building Management Systems (BMS) are integrated with and interconnected to both hardwired and cloud based solutions, as well as third party applications, their attack surface is large and getting larger.
Seema Haji's picture
As OT environments evolve, security is key to thwarting attacks with the potential to cause large and costly disruptions.
Jalal Bouhdada's picture
By deploying robots with cybersecurity in mind we can ensure that they don’t run the danger of introducing the same negative effects into their environment.
Seema Haji's picture
Failing to implement the right security controls could open the door for attacks and disruption that threatens system availability and performance — the very reasons for leveraging the power of IoT in the first place.
Barak Perelman's picture
Passive network security monitoring has its value for identifying certain indicators of compromise (IoC), but does not detect and mitigate all attacks or incidents on ICS networks.