Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Remotely exploitable DoS vulnerability found in some of Rockwell Automation’s MicroLogix controllers and ControlLogix communications modules. [Read More]
Siemens conducted a pilot test for releasing security advisories on the second Tuesday of each month (Patch Tuesday), just like Microsoft, Adobe and SAP. [Read More]
Symantec unveils Industrial Control System Protection (ICSP) Neural, a USB scanning station designed to protect industrial and IoT environments against USB-borne malware. [Read More]
Malicious actors could abuse machine-to-machine (M2M) protocols such as MQTT and CoAP in attacks aimed at IoT and industrial IoT systems. [Read More]
Siemens warns users that a multifunctional platform for SIMATIC S7-1500 CPUs is affected by over 20 vulnerabilities in Linux and GNU components [Read More]
A report by the UK parliament's Joint Committee on the National Security Strategy says, "The Government's current approach to improving the cyber resilience of the UK's critical national infrastructure is long on aspiration but short on delivery." [Read More]
Trend Micro and Moxa announce TXOne Networks, a joint venture focusing on securing Industrial Internet of Things (IIoT) environments [Read More]
While CVSS can be useful for rating vulnerabilities, the use of the standard for flaws affecting ICS can have negative consequences, particularly if an organization relies solely on it for prioritizing patches [Read More]
Congress passes Cybersecurity and Infrastructure Security Agency (CISA) Act, which creates a new cybersecurity agency at the DHS [Read More]
Industrial cybersecurity firm Dragos raises $37 million, which it will use to accelerate growth of its software platform, threat intelligence, and threat operations services [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Jalal Bouhdada's picture
Building owners, suppliers and managers need to act to ensure the security of buildings and the private data they hold, and the safety of those within them.
Galina Antova's picture
Proper network segmentation is one of the most impactful actions industrial asset owners can take to reduce the risk of a major security incident.
Barak Perelman's picture
For industrial organizations, establishing an infrastructure that provides visibility, security, control, and is purpose-built for operational technologies (OT), is the clearest path to compliance.
Galina Antova's picture
In assessing industrial cyber risk and prioritizing your remediation steps, it can be difficult to even determine where to begin.
Bradon Rogers's picture
Industrial IoT in the enterprise expands the threat landscape by opening up new vulnerabilities that can be exploited across endpoints, applications, cloud infrastructure and networks.
Jalal Bouhdada's picture
Jalal Bouhdada, Founder and Principal ICS Security Consultant at Applied Risk, discusses the physical and cyber security threats facing the increasingly smart car.
Barak Perelman's picture
The new connectivity between IT and OT has created a clear and present cyber threat to previously isolated ICS environments.
Galina Antova's picture
We must recognize industrial cyberattacks as tactics in a new form of “economic warfare” being waged between nation-states to gain economic and political advantage without having to pay the price of open combat.
Galina Antova's picture
Why are some organizations quicker to act while others lag behind? Based on the conversations I have every day with executives at these organizations, I’ve outlined a few “ABCs” of trends that are making a real difference.
Jalal Bouhdada's picture
The nature of the shipping industry does present highly unique challenges for hardening cybersecurity, but they are not insurmountable.