Security Experts:

long dotted


Industrial safety controllers from several vendors vulnerable to remote DoS attacks, including directly from the Internet [Read More]
Researchers from Kaspersky Lab ICS CERT have analyzed servers that an infamous threat actor known as Energetic Bear has compromised in attacks in recent years. [Read More]
Rockwell Automation informs customers that Allen-Bradley Stratix and ArmorStratix industrial switches are exposed to remote attacks due to flaws in Cisco IOS software [Read More]
Many security professionals in the energy sector are concerned that a cyberattack on industrial control systems could have “catastrophic” consequences [Read More]
U.S. Energy Department announces funding opportunity for research and development of cybersecurity technologies designed to protect energy infrastructure against attacks [Read More]
Cisco Talos researchers find 17 vulnerabilities in Moxa industrial routers, including many high severity command injection and DoS flaws [Read More]
Mocana TrustCenter provides supply chain integrity, allows faster development and provisioning of devices containing TrustPoint security, and to reduce costs by automating secure enrollment and provisioning at a scale. [Read More]
Industrial Internet Consortium (IIC) develops new IoT Security Maturity Model (SMM), building on its own security framework and reference architecture [Read More]
Electrical substations and other power supply facilities are exposed to attacks by severe vulnerabilities found in Siemens protection relays [Read More]
SecurityWeek’s 2018 Singapore ICS Cyber Security Conference, the premier industrial and critical infrastructure cyber security conference for the APAC region, will take place on April 24-26 at Fairmont Singapore [Read More]


rss icon

Jalal Bouhdada's picture
Jalal Bouhdada, Founder and Principal ICS Security Consultant at Applied Risk, discusses the implications of the new EU Directive on Security of Network and Information Systems (NIS)
Barak Perelman's picture
2018 will present new and increasing industrial cyber security challenges for facilities operators, but new developments will help minimize those threats.
Galina Antova's picture
There is no more important mission in cybersecurity than securing the Industrial Control Systems networks that power our world and our lives.
Ashley Arbuckle's picture
Here are five recommendations that can help you, as an IT security professional, proactively work in partnership with your OT counterparts to protect the business better.
Jalal Bouhdada's picture
Everyone from bedroom hackers to state sponsored spies have wanted to breach critical systems since the dawn of the networked era, whether that be for monetary gain, secret information, or just pure curiosity.
Ashley Arbuckle's picture
The goal of IT/OT convergence is to make the OT side more resilient through effective cyber protections, and instill confidence in your board and senior executives.
Barak Perelman's picture
The successful deployment of industrial cybersecurity projects must leverage resources from both IT and OT.
Galina Antova's picture
Following these prescriptive steps can help do something about the state of security in your own ICS network environment.
David Holmes's picture
Manufacturers are currently experimenting with several possible methods to avoid default passwords, and your IoT project must consider the default password problem to be among the highest priority.
Galina Antova's picture
From the boardroom to the security operations center, lip service can no longer be paid to ICS/critical infrastructure/OT cybersecurity.