Security Experts:

long dotted


A ransomware infection at a U.S. natural gas compression facility resulted in a two-day operational shutdown of an entire pipeline asset. [Read More]
Many upstream oil and gas companies invested in cybersecurity in 2019, according to a survey conducted by Accenture. [Read More]
A serious vulnerability found in the Profinet industrial communication protocol exposes devices from Siemens, Moxa and possibly other vendors to DoS attacks. [Read More]
Siemens’ Patch Tuesday updates for February 2020 address serious DoS vulnerabilities in several of the company’s products. [Read More]
IBM says attacks targeting OT infrastructure increased by over 2000 percent in 2019, and the most commonly seen piece of malware was the Mirai variant Echobot. [Read More]
Leidos Holdings has agreed to acquire the airport security and automation businesses from UK-based L3Harris for $1 billion in cash. [Read More]
Hackers are actively targeting a vulnerability in Linear eMerge E3 access controllers to infect the devices with malware and abuse them to launch DDoS attacks. [Read More]
Millions of devices present in smart cities, industrial environments, smart homes, vehicles and healthcare organizations could be exposed to attacks due to LoRaWAN vulnerabilities. [Read More]
Cisco has launched an industrial IoT security solution to provide organizations enhanced visibility across their IT and OT environments and help them detect threats. [Read More]
The aviation industry is facing the same problems that all companies face when information technology and operations technology (OT) merge -- but perhaps with higher stakes. [Read More]


rss icon

Galina Antova's picture
We are at a stage where adversaries regularly operate below the threshold of armed conflict, using their powerful warcraft for economic and political advantage while maintaining plausible deniability.
Barak Perelman's picture
While pharmaceutical operations networks were once siloed, today their connection to IT and anywhere access has created an environment that threatens the integrity of drug formulation control systems.
Barak Perelman's picture
Recycled cyber attacks may be a fairly new development in ICS security, but they have been a staple in IT environments for years.
Seema Haji's picture
Security is often the first place IT and OT teams meet. There are always kinks to iron out, and ensuring a strong security posture is paramount regardless of the teams involved.
Barak Perelman's picture
The same cloud technology that has exposed OT networks to external threats is now providing an alternative for protecting organizations when the physical deployment of OT security equipment is not practical.
Seema Haji's picture
An insider breach targeting OT and IoT systems has the potential to shut down electrical grids, contaminate water supplies and otherwise destroy a nation’s infrastructure.
Seema Haji's picture
Technologies like artificial intelligence (AI), augmented reality (AR) and machine learning (ML) once seemed stranger than fiction, but are now playing a growing role in industrial environments.
Barak Perelman's picture
Since Building Management Systems (BMS) are integrated with and interconnected to both hardwired and cloud based solutions, as well as third party applications, their attack surface is large and getting larger.
Seema Haji's picture
As OT environments evolve, security is key to thwarting attacks with the potential to cause large and costly disruptions.
Jalal Bouhdada's picture
By deploying robots with cybersecurity in mind we can ensure that they don’t run the danger of introducing the same negative effects into their environment.