Security Experts:

long dotted


Rockwell Automation is working on patches for two vulnerabilities affecting its Allen-Bradley PowerMonitor 1000 power monitors. Details of the flaws and proof-of-concept (PoC) code are publicly available. [Read More]
Roughly one-third of the ICS-specific vulnerability advisories published in 2018 contained basic factual errors, including when describing and rating the severity of a flaw, according to Dragos. [Read More]
There are over 7,400 instances of a refrigeration system exposed on the Internet due to the failure of owners to change the default password and implement other security measures. [Read More]
A survey of over 650 people from organizations of all sizes in various sectors reveals the security, safety and privacy challenges and concerns related to IT/OT/IIoT convergence. [Read More]
An industrial gateway made by Germany-based Kunbus is affected by serious vulnerabilities that can be exploited to gain complete control of a device. [Read More]
Claroty along with veteran security and operational practitioners who have faced these challenges first-hand will discuss foundational people, process and technology decisions and explore various approaches to addressing these issues. [Read More]
A US energy company, identified by some as Duke Energy, received a $10 million fine from the North American Electric Reliability Corporation (NERC) for nearly 130 violations of Critical Infrastructure Protection standards. [Read More]
The Industrial Internet Consortium (IIC) and the OpenFog Consortium this week announced they finalized the details to merge into a single entity. [Read More]
The US intelligence community’s latest worldwide threat assessment warns that Russia and China are capable of disrupting critical infrastructure and Iran is not far behind. [Read More]
The official Call for Presenations (CFP) for SecurityWeek’s 2019 Singapore Industrial Control Systems (ICS) Cyber Security Conference, being held April 16–18 at the Fairmont Singapore & Swissôtel The Stamford closes January 31. [Read More]


rss icon

Jalal Bouhdada's picture
It pays to be ahead of regulators, because if you’re aiming to be truly secure then you’ll already be meeting many of the key requirements of any local law.
Galina Antova's picture
The most successful organizations will be the ones that look at cyber risk holistically and build bridges between the IT, OT, and Security organizations.
Barak Perelman's picture
Concerns about endpoint security in industrial environments, especially among OT personnel, are being driven by the demise of the traditional air gapping of OT infrastructures.
Jalal Bouhdada's picture
Wireless IIoT solutions are fast to deploy, but companies must gauge whether they are an appropriate solution based on a number of different factors.
Jalal Bouhdada's picture
Building owners, suppliers and managers need to act to ensure the security of buildings and the private data they hold, and the safety of those within them.
Galina Antova's picture
Proper network segmentation is one of the most impactful actions industrial asset owners can take to reduce the risk of a major security incident.
Barak Perelman's picture
For industrial organizations, establishing an infrastructure that provides visibility, security, control, and is purpose-built for operational technologies (OT), is the clearest path to compliance.
Galina Antova's picture
In assessing industrial cyber risk and prioritizing your remediation steps, it can be difficult to even determine where to begin.
Bradon Rogers's picture
Industrial IoT in the enterprise expands the threat landscape by opening up new vulnerabilities that can be exploited across endpoints, applications, cloud infrastructure and networks.
Jalal Bouhdada's picture
Jalal Bouhdada, Founder and Principal ICS Security Consultant at Applied Risk, discusses the physical and cyber security threats facing the increasingly smart car.