Security Experts:

long dotted


The products of several industrial automation companies are affected by the recently disclosed vulnerabilities in the WibuKey DRM solution. [Read More]
A critical vulnerability in Rockwell Automation’s RSLinx Classic software can be exploited for DoS attacks and possibly for remote code execution. [Read More]
Tripwire launches Penetration Testing Assessment and Industrial Cybersecurity Assessment services to help organizations find vulnerabilities in their systems. [Read More]
Siemens informs customers that its SICAM process control system and SIMATIC WinCC HMI are affected by serious vulnerabilities in the WibuKey DRM. [Read More]
Rockwell Automation is working on patches for two vulnerabilities affecting its Allen-Bradley PowerMonitor 1000 power monitors. Details of the flaws and proof-of-concept (PoC) code are publicly available. [Read More]
Roughly one-third of the ICS-specific vulnerability advisories published in 2018 contained basic factual errors, including when describing and rating the severity of a flaw, according to Dragos. [Read More]
There are over 7,400 instances of a refrigeration system exposed on the Internet due to the failure of owners to change the default password and implement other security measures. [Read More]
A survey of over 650 people from organizations of all sizes in various sectors reveals the security, safety and privacy challenges and concerns related to IT/OT/IIoT convergence. [Read More]
An industrial gateway made by Germany-based Kunbus is affected by serious vulnerabilities that can be exploited to gain complete control of a device. [Read More]
Claroty along with veteran security and operational practitioners who have faced these challenges first-hand will discuss foundational people, process and technology decisions and explore various approaches to addressing these issues. [Read More]


rss icon

Barak Perelman's picture
For industrial organizations, establishing an infrastructure that provides visibility, security, control, and is purpose-built for operational technologies (OT), is the clearest path to compliance.
Galina Antova's picture
In assessing industrial cyber risk and prioritizing your remediation steps, it can be difficult to even determine where to begin.
Bradon Rogers's picture
Industrial IoT in the enterprise expands the threat landscape by opening up new vulnerabilities that can be exploited across endpoints, applications, cloud infrastructure and networks.
Jalal Bouhdada's picture
Jalal Bouhdada, Founder and Principal ICS Security Consultant at Applied Risk, discusses the physical and cyber security threats facing the increasingly smart car.
Barak Perelman's picture
The new connectivity between IT and OT has created a clear and present cyber threat to previously isolated ICS environments.
Galina Antova's picture
We must recognize industrial cyberattacks as tactics in a new form of “economic warfare” being waged between nation-states to gain economic and political advantage without having to pay the price of open combat.
Galina Antova's picture
Why are some organizations quicker to act while others lag behind? Based on the conversations I have every day with executives at these organizations, I’ve outlined a few “ABCs” of trends that are making a real difference.
Jalal Bouhdada's picture
The nature of the shipping industry does present highly unique challenges for hardening cybersecurity, but they are not insurmountable.
Stan Engelbrecht's picture
Which unlucky industry will be the latest target caught in the crosshairs of cyber attackers? Unfortunately, there are several reasons that suggest mass transit will be the next casualty, and the potential for damage is quite serious.
Barak Perelman's picture
The breadth of attacks targeting critical infrastructure sectors are not only deeper but also broader than originally thought. Most likely, Russia and others want to acquire a “Red Button” capability that can be used to shut down the power grid.