Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

A new report from the United States Government Accountability Office (GAO) shows that the Department of Energy (DOE) has yet to fully analyze the electric grid cybersecurity risks. [Read More]
Honeywell introduces the Forge Cybersecurity Platform, a solution designed to help industrial organizations protect OT and IIoT assets. [Read More]
Critical infrastructure and other organizations are increasingly at risk of being targeted in attacks involving RDP and disruptive ransomware. [Read More]
Kaspersky announces the ICS Vulnerabilities Database, a new service that provides information on vulnerabilities in ICS/IIoT products and ICS threat signatures. [Read More]
Drone strikes on Saudi oil infrastructure highlights the easy vulnerability of such facilities even as the kingdom has splurged billions on sophisticated defense hardware. [Read More]
Several critical and high-severity vulnerabilities that can be exploited remotely have been found recently in widely used CODESYS industrial products. [Read More]
The Russian hackers behind the 2016 Crashoverride/Industroyer attack that caused a power outage in Ukraine may have been hoping to cause more serious damage. [Read More]
Siemens issues several security advisories, including for the Windows flaws tracked as DejaBlue and the Linux kernel SACK flaws. [Read More]
A denial-of-service (DoS) attack exploiting a known vulnerability disrupted firewalls at a US power utility. [Read More]
US-based Red Lion has addressed several vulnerabilities, including ones classified as serious, in its Crimson HMI software. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Jalal Bouhdada's picture
The Secure Development Lifecycle (SDL) process is still notable by its absence in many new deployments of Industrial Internet of Things (IIoT) technologies.
Galina Antova's picture
The next year will surprise all of us in at least one way or another. How we deal with these surprises, both individually and collectively, will, in the end, define the next twelve months.
Justin Fier's picture
Against the ongoing backdrop of cyber conflict between nation states and escalating warnings from the Department of Homeland Security, critical infrastructure is becoming a central target for threat actors.
Jalal Bouhdada's picture
In the event of a cybersecurity incident in an industrial environment, you should follow a well-established seven step response process.
Galina Antova's picture
From a communications and technical standpoint, the Onslow Water and Sewer Authority (ONWASA) turned a malicious cyber incident into a strong success story on many fronts.
Justin Fier's picture
The rapid shift toward hyper-connected “smart” ports is rendering physical harbors susceptible to traditionally digital threats.
Barak Perelman's picture
Many organizations with OT networks face a massive challenge to maintain operational efficiency and improve network security at the same time.
Jalal Bouhdada's picture
It pays to be ahead of regulators, because if you’re aiming to be truly secure then you’ll already be meeting many of the key requirements of any local law.
Galina Antova's picture
The most successful organizations will be the ones that look at cyber risk holistically and build bridges between the IT, OT, and Security organizations.
Barak Perelman's picture
Concerns about endpoint security in industrial environments, especially among OT personnel, are being driven by the demise of the traditional air gapping of OT infrastructures.