Security Experts:

long dotted


Operations at two major US-based chemical companies, Hexion and Momentive, have been disrupted by a cyberattack reportedly involving LockerGoga, the ransomware that recently hit aluminum giant Norsk Hydro. [Read More]
Industrial cybersecurity firm CyberX raises $18 million in a strategic funding round, which brings the total raised by the company to date to $48 million. [Read More]
A serious DoS vulnerability has been found in Schneider Electric’s Triconex TriStation Emulator software. No patch is available, but the vendor says it does not pose a risk to operating safety controllers. [Read More]
Join Fortinet and SecurityWeek for an interactive webinar as we discuss lessons from real-world cyber incidents targeting industrial OT environments. [Read More]
Industrial cybersecurity company Nozomi announces formal launch of its research department, Nozomi Networks Labs. [Read More]
Norwegian metals and energy giant Norsk Hydro has been hit by a serious ransomware attack that impacted operations, forcing the company to resort to manual processes. [Read More]
One of the world's biggest aluminium producers, Norway's Norsk Hydro, has been hit by an "extensive cyberattack" that impacted operations. [Read More]
Industrial cybersecurity firm Dragos on Monday announced the acquisition of ICS visibility tech provider NexDefense and the release of free security assessment tools. [Read More]
Venezuelan President Nicolas Maduro's government says the massive power outage was caused by a cyberattack launched by the United States, but experts say a breakdown of old equipment is much more likely. [Read More]
Over a dozen vulnerabilities, including ones classified as critical, have been found by researchers in industrial switches from Moxa. Patches and mitigations have been released by the vendor. [Read More]


rss icon

Jalal Bouhdada's picture
In the event of a cybersecurity incident in an industrial environment, you should follow a well-established seven step response process.
Galina Antova's picture
From a communications and technical standpoint, the Onslow Water and Sewer Authority (ONWASA) turned a malicious cyber incident into a strong success story on many fronts.
Justin Fier's picture
The rapid shift toward hyper-connected “smart” ports is rendering physical harbors susceptible to traditionally digital threats.
Barak Perelman's picture
Many organizations with OT networks face a massive challenge to maintain operational efficiency and improve network security at the same time.
Jalal Bouhdada's picture
It pays to be ahead of regulators, because if you’re aiming to be truly secure then you’ll already be meeting many of the key requirements of any local law.
Galina Antova's picture
The most successful organizations will be the ones that look at cyber risk holistically and build bridges between the IT, OT, and Security organizations.
Barak Perelman's picture
Concerns about endpoint security in industrial environments, especially among OT personnel, are being driven by the demise of the traditional air gapping of OT infrastructures.
Jalal Bouhdada's picture
Wireless IIoT solutions are fast to deploy, but companies must gauge whether they are an appropriate solution based on a number of different factors.
Jalal Bouhdada's picture
Building owners, suppliers and managers need to act to ensure the security of buildings and the private data they hold, and the safety of those within them.
Galina Antova's picture
Proper network segmentation is one of the most impactful actions industrial asset owners can take to reduce the risk of a major security incident.