Security Experts:

long dotted


Microsoft announced on Tuesday at its Ignite conference that it has extended its threat protection portfolio and it has unified some of its security solutions under the Microsoft Defender brand. [Read More]
U.S. FERC and NERC release a report outlining cyber incident response and recovery best practices for electric utilities. [Read More]
CISA has been named a Top-Level Root CVE Numbering Authority and it will oversee CNAs that issue CVE identifiers for vulnerabilities in industrial and medical products. [Read More]
OT and IoT cybersecurity company Nozomi Networks announced this week that it’s now a CVE Numbering Authority (CNA). [Read More]
Several major ICS vendors have released security advisories in response to the recently disclosed vulnerabilities affecting the CodeMeter licensing and DRM solution. [Read More]
Vulnerabilities in the CodeMeter licensing and DRM solution from Wibu can expose industrial systems to remote attacks. [Read More]
Over 70% of the ICS vulnerabilities disclosed in the first half of 2020 were remotely exploitable, Claroty reports. [Read More]
Industrial cybersecurity firm Radiflow launches CIARA, an automated risk analysis platform for industrial systems. [Read More]
The official Call for Presentations (speakers) for SecurityWeek’s 2020 Industrial Control Systems (ICS) Cyber Security Conference has been extended to August 31st. [Read More]
The first entirely virtual edition of the Black Hat cybersecurity conference took place last week and researchers from tens of organizations presented the results of their work from the past year. [Read More]


rss icon

Galina Antova's picture
How do we take what we’ve learned this year, capitalize on the change in mindset that it is possible to move fast, and apply it to seize the OT security opportunity in 2021?
Galina Antova's picture
As digital transformation and cybersecurity become pillars that successful companies will build their futures on, the time has come to include CISOs and CIOs on company boards.
Matt Morris's picture
Companies must instill a culture of resilience in which security improvements are emphasized as a fundamental component of an organization’s individual corporate culture
Galina Antova's picture
Let’s learn from the previous examples of economic warfare and use the detailed observations and recommendations from NSA and CISA to protect OT networks to our advantage.
Galina Antova's picture
Three recommendations that can help foster acceptance for Digital transformation initiatives so that more companies can move quickly and drive business value.
Galina Antova's picture
With the right tools in place, IT and OT teams can work together, leveraging visibility and continuity across the attack surface to govern OT networks with the same processes and reporting metrics.
Galina Antova's picture
It’s very challenging for OT professionals to play catch up and close the 25+ year IT-OT security gap, particularly as the number of connectivity points grows exponentially.
Galina Antova's picture
When your core business operations, digital transformation initiatives and workers’ ability to do their jobs are at risk, effective OT security must become just as ubiquitous
Galina Antova's picture
Eliminate complexity, align IT and OT teams, and simplify governance are my top three recommendations for how to bridge the IT-OT security gap.
Galina Antova's picture
How to secure your OT network without trying to repurpose your IT playbook and eliminate complexity in the process.