Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Shodan announces Monitor, a new service designed to help organizations keep track of systems connected to the Internet. [Read More]
Nearly half of the industrial control system (ICS) computers protected by Kaspersky were targeted by malware and other threats in 2018. [Read More]
Operations at two major US-based chemical companies, Hexion and Momentive, have been disrupted by a cyberattack reportedly involving LockerGoga, the ransomware that recently hit aluminum giant Norsk Hydro. [Read More]
Industrial cybersecurity firm CyberX raises $18 million in a strategic funding round, which brings the total raised by the company to date to $48 million. [Read More]
A serious DoS vulnerability has been found in Schneider Electric’s Triconex TriStation Emulator software. No patch is available, but the vendor says it does not pose a risk to operating safety controllers. [Read More]
Join Fortinet and SecurityWeek for an interactive webinar as we discuss lessons from real-world cyber incidents targeting industrial OT environments. [Read More]
Industrial cybersecurity company Nozomi announces formal launch of its research department, Nozomi Networks Labs. [Read More]
Norwegian metals and energy giant Norsk Hydro has been hit by a serious ransomware attack that impacted operations, forcing the company to resort to manual processes. [Read More]
One of the world's biggest aluminium producers, Norway's Norsk Hydro, has been hit by an "extensive cyberattack" that impacted operations. [Read More]
Industrial cybersecurity firm Dragos on Monday announced the acquisition of ICS visibility tech provider NexDefense and the release of free security assessment tools. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Justin Fier's picture
Against the ongoing backdrop of cyber conflict between nation states and escalating warnings from the Department of Homeland Security, critical infrastructure is becoming a central target for threat actors.
Jalal Bouhdada's picture
In the event of a cybersecurity incident in an industrial environment, you should follow a well-established seven step response process.
Galina Antova's picture
From a communications and technical standpoint, the Onslow Water and Sewer Authority (ONWASA) turned a malicious cyber incident into a strong success story on many fronts.
Justin Fier's picture
The rapid shift toward hyper-connected “smart” ports is rendering physical harbors susceptible to traditionally digital threats.
Barak Perelman's picture
Many organizations with OT networks face a massive challenge to maintain operational efficiency and improve network security at the same time.
Jalal Bouhdada's picture
It pays to be ahead of regulators, because if you’re aiming to be truly secure then you’ll already be meeting many of the key requirements of any local law.
Galina Antova's picture
The most successful organizations will be the ones that look at cyber risk holistically and build bridges between the IT, OT, and Security organizations.
Barak Perelman's picture
Concerns about endpoint security in industrial environments, especially among OT personnel, are being driven by the demise of the traditional air gapping of OT infrastructures.
Jalal Bouhdada's picture
Wireless IIoT solutions are fast to deploy, but companies must gauge whether they are an appropriate solution based on a number of different factors.
Jalal Bouhdada's picture
Building owners, suppliers and managers need to act to ensure the security of buildings and the private data they hold, and the safety of those within them.