Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Rail and metro cybersecurity company Cylus has raised $12 million in a Series A funding round, bringing the total amount raised by the company to date to $17 million. [Read More]
Cisco has agreed to acquire privately-held operational technology (OT) cybersecurity firm Sentryo for an undisclosed sum. [Read More]
Cisco has found several vulnerabilities, including one code execution flaw, in its Industrial Network Director product. [Read More]
Several vulnerabilities, including ones classified as “high risk,” have been found in APROL process control systems from B&R Industrial Automation. [Read More]
A new survey from Irdeto demonstrates that direct cyber-attacks against IIoT have already started, and that industry is not yet well prepared. [Read More]
Siemens has teamed up with Alphabet-owned cybersecurity company Chronicle to provide industrial monitoring and detection solutions for the energy sector. [Read More]
A vulnerability in Mitsubishi Electric MELSEC-Q PLCs exposes devices to remote DoS attacks. [Read More]
The wormable Windows RDS vulnerability patched recently by Microsoft (CVE-2019-0708), including in Windows XP and Server 2003, poses a serious risk to industrial environments. [Read More]
Microsoft patches nearly 80 vulnerabilities with its May 2019 Patch Tuesday updates, including a zero-day and a wormable RDS flaw that can be exploited for WannaCry-like attacks. [Read More]
Siemens’ May 2019 Patch Tuesday advisories address over a dozen vulnerabilities, including serious flaws affecting LOGO and SINAMICS Perfect Harmony products. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Galina Antova's picture
We’ve seen the discussion moving away from an active vs. passive debate to one seeking a more balanced approach that integrates the right mix of detection technologies.
Barak Perelman's picture
Just as internet security was a relative unknown concern 20 years ago, public awareness of threats to the electric grid, water supplies, etc. is mounting
Laurence Pitt's picture
By working together, IT and OT teams can ensure better security across the whole enterprise environment and that can only be good for business.
Seema Haji's picture
As industrial environments become more complex, data-type and data-source agnostic technologies need to be employed. Both IT and OT teams should be able to quickly access and analyze all data relevant to their needs.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.
Jalal Bouhdada's picture
The Secure Development Lifecycle (SDL) process is still notable by its absence in many new deployments of Industrial Internet of Things (IIoT) technologies.
Galina Antova's picture
The next year will surprise all of us in at least one way or another. How we deal with these surprises, both individually and collectively, will, in the end, define the next twelve months.
Justin Fier's picture
Against the ongoing backdrop of cyber conflict between nation states and escalating warnings from the Department of Homeland Security, critical infrastructure is becoming a central target for threat actors.
Jalal Bouhdada's picture
In the event of a cybersecurity incident in an industrial environment, you should follow a well-established seven step response process.
Galina Antova's picture
From a communications and technical standpoint, the Onslow Water and Sewer Authority (ONWASA) turned a malicious cyber incident into a strong success story on many fronts.