Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

ICS-CERT conducted over 170 assessments in critical infrastructure organizations in 2017 – main weakness remains improper boundary protection, but shared user accounts are increasingly problematic [Read More]
Vulnerabilities allow hackers to take control of Phoenix Contact industrial switches and disrupt operations, researchers warn [Read More]
ICS vendors are assessing the impact of the Meltdown and Spectre vulnerabilities, but extensive testing is needed before any patches can be applied [Read More]
An analysis of ICS/SCADA mobile applications from 34 vendors led to the discovery of more than 140 vulnerabilities [Read More]
Rockwell Automation patches high severity vulnerability in MicroLogix 1400 controllers. Flaw allows DoS attacks and possibly remote code execution [Read More]
Industrial cybersecurity firm Nozomi Networks has raised $15 million in a Series B funding round, the company announced Wednesday. [Read More]
Advantech has patched another round of vulnerabilities, including several rated high severity, in its WebAccess HMI/SCADA product [Read More]
An increasing number of companies in the industrial sector reported experiencing a targeted attack, according to a Kaspersky survey of nearly 1,000 organizations [Read More]
Schneider Electric patches three vulnerabilities, including one rated high severity, in its Pelco VideoXpert Enterprise video management system [Read More]
Some of the rugged tablets, phones and PDAs made by Pepperl+Fuchs-owned ecom are vulnerable to KRACK attacks [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Barak Perelman's picture
The successful deployment of industrial cybersecurity projects must leverage resources from both IT and OT.
Galina Antova's picture
Following these prescriptive steps can help do something about the state of security in your own ICS network environment.
David Holmes's picture
Manufacturers are currently experimenting with several possible methods to avoid default passwords, and your IoT project must consider the default password problem to be among the highest priority.
Galina Antova's picture
From the boardroom to the security operations center, lip service can no longer be paid to ICS/critical infrastructure/OT cybersecurity.
Ashley Arbuckle's picture
Segmentation is an important element of any security strategy to mitigate risk from IoT-based attacks, but it has to be done right.
Josh Lefkowitz's picture
Oil and gas is one of the critical infrastructure sectors that face greater risks and challenges when it comes to security
Galina Antova's picture
In the ICS world, we clearly don’t have a decade to evolve through the same layered/defense-in-depth strategies that marked the last decade in IT security.
Barak Perelman's picture
Organizations need specialized monitoring and control technologies for ICS networks that provide the deep, real-time visibility to identify suspicious or malicious activity
Barak Perelman's picture
If WannaCry had targeted industrial controllers, it would have been much more difficult to protect them and the damage would have been much more widespread.
Riaz Zolfonoon's picture
It’s the best of the internet of things and the worst of the internet of things: unprecedented connectivity that creates both tremendous opportunity and considerable risk.