Security Experts:

long dotted


The ICS Cyber Security Conference, the largest and longest-running ICS-focused security conference, returns to Atlanta, Ga., on October 22 - 25, 2018 [Read More]
Many vulnerabilities, including serious flaws that allow arbitrary code execution, found recently in ICS products from China-based Wecon [Read More]
Precise agriculture is exposed to vulnerabilities and cyber-threats, a new report from the United States Department of Homeland Security (DHS) warns. [Read More]
Splunk unveils Splunk for Industrial IoT, a solution designed to help organizations secure ICS, monitor and diagnose equipment, and predict downtime [Read More]
US Energy Department is offering up to $28 million for tools and technologies designed to improve the resilience and cybersecurity of energy critical infrastructure [Read More]
Critical vulnerabilities affecting Fuji Electric servo systems and drives have been disclosed, but patches are not available [Read More]
Industrial cybersecurity firm Nozomi Networks raises $30 million in a Series C funding round, which brings the total secured by the company to date to nearly $54 million [Read More]
Remote administration tools (RATs) used for legitimate purposes in operational technology networks can pose a serious risk, allowing malicious actors to target industrial systems, Kaspersky warns [Read More]
Rockwell Automation patches several critical and high severity vulnerabilities that allow DoS attacks and possibly code execution in RSLinx Classic communications software [Read More]
Google’s Android team finds high severity privilege escalation vulnerability in Honeywell’s Android-based handheld computers [Read More]


rss icon

Jalal Bouhdada's picture
It pays to be ahead of regulators, because if you’re aiming to be truly secure then you’ll already be meeting many of the key requirements of any local law.
Galina Antova's picture
The most successful organizations will be the ones that look at cyber risk holistically and build bridges between the IT, OT, and Security organizations.
Barak Perelman's picture
Concerns about endpoint security in industrial environments, especially among OT personnel, are being driven by the demise of the traditional air gapping of OT infrastructures.
Jalal Bouhdada's picture
Wireless IIoT solutions are fast to deploy, but companies must gauge whether they are an appropriate solution based on a number of different factors.
Jalal Bouhdada's picture
Building owners, suppliers and managers need to act to ensure the security of buildings and the private data they hold, and the safety of those within them.
Galina Antova's picture
Proper network segmentation is one of the most impactful actions industrial asset owners can take to reduce the risk of a major security incident.
Barak Perelman's picture
For industrial organizations, establishing an infrastructure that provides visibility, security, control, and is purpose-built for operational technologies (OT), is the clearest path to compliance.
Galina Antova's picture
In assessing industrial cyber risk and prioritizing your remediation steps, it can be difficult to even determine where to begin.
Bradon Rogers's picture
Industrial IoT in the enterprise expands the threat landscape by opening up new vulnerabilities that can be exploited across endpoints, applications, cloud infrastructure and networks.
Jalal Bouhdada's picture
Jalal Bouhdada, Founder and Principal ICS Security Consultant at Applied Risk, discusses the physical and cyber security threats facing the increasingly smart car.