Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

The United States and Baltic states agreed to beef up cooperation to protect the Baltic energy grid from cyber attacks as they disconnect from the Russian electricity grid. [Read More]
A researcher has developed and open source intelligence (OSINT) to show how easy it is for adversaries to gather intelligence on critical infrastructure in the United States. [Read More]
Attackers using the Adwind remote access Trojan (RAT) are targeting petroleum firms in the United States in a recent campaign. [Read More]
The Urgent/11 vulnerabilities confirmed to impact other RTOS, which means more industrial and medical devices are affected than previously thought. [Read More]
SecurityWeek will offer an Advanced ICS/SCADA Hacking Training program at its 2019 Industrial Control Systems (ICS) Cyber Security Conference in Atlanta. [Read More]
The Cyber Security Agency of Singapore (CSA) has published the country’s Operational Technology Cybersecurity Masterplan. [Read More]
Tridium Niagara products are affected by a couple of vulnerabilities in BlackBerry QNX, including one that could allow an attacker to access sensitive information. [Read More]
A new report from the United States Government Accountability Office (GAO) shows that the Department of Energy (DOE) has yet to fully analyze the electric grid cybersecurity risks. [Read More]
Honeywell introduces the Forge Cybersecurity Platform, a solution designed to help industrial organizations protect OT and IIoT assets. [Read More]
Critical infrastructure and other organizations are increasingly at risk of being targeted in attacks involving RDP and disruptive ransomware. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Barak Perelman's picture
Passive network security monitoring has its value for identifying certain indicators of compromise (IoC), but does not detect and mitigate all attacks or incidents on ICS networks.
Jalal Bouhdada's picture
Protecting global transport networks should be a priority for operators, governments and cybersecurity professionals.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Dean Weber's picture
Examining the Triton attack toolkit and methodology behind it offers industrial manufacturers and OEMs, plant safety teams and IT/OT teams more insight into what they need to do to get ahead of hardening their networks
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Galina Antova's picture
We’ve seen the discussion moving away from an active vs. passive debate to one seeking a more balanced approach that integrates the right mix of detection technologies.
Barak Perelman's picture
Just as internet security was a relative unknown concern 20 years ago, public awareness of threats to the electric grid, water supplies, etc. is mounting
Laurence Pitt's picture
By working together, IT and OT teams can ensure better security across the whole enterprise environment and that can only be good for business.
Seema Haji's picture
As industrial environments become more complex, data-type and data-source agnostic technologies need to be employed. Both IT and OT teams should be able to quickly access and analyze all data relevant to their needs.
Seema Haji's picture
With the new year underway, it’s time for CISOs to see their security resolutions through from the factory floor, SOCs and across the entire enterprise.