Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Researcher finds over 100 vulnerabilities in building management and access control systems from four vendors. The flaws expose many buildings to attacks, including famous monuments and major organizations. [Read More]
NIST’s National Cybersecurity Center of Excellence (NCCoE) is working on an industrial IoT (IIoT) security project for the energy sector. [Read More]
GandCrab, once known as a consumer-targeting ransomware, is increasingly being used in attacks against business organizations [Read More]
Several vulnerabilities discovered by a researcher in GE software used for power meters, including hardcoded credentials and privilege escalation flaws. [Read More]
The TSA doesn't have a strategic workforce plan to help ensure it identifies the skills and competencies—such as the required level of cybersecurity expertise—necessary to carry out its pipeline security responsibilities, a GAO report shows. [Read More]
A denial-of-service (DoS) attack has been blamed for disrupting US electrical grid operations in the Western region. [Read More]
Two vulnerabilities discovered by CyberX and Nozomi in Rockwell Automation controllers expose devices to DoS attacks. [Read More]
Cisco Talos researchers find nearly a dozen vulnerabilities in Sierra Wireless AirLink gateways and routers, including serious flaws that can be exploited to change system settings, execute arbitrary code, and modify passwords. [Read More]
NIST updates its ACTS toolkit to help developers of safety-critical applications, such as the ones powering aircraft and nuclear power plants, find errors and make their software safer. [Read More]
Swiss-based special-purpose vehicle maker Aebi Schmidt confirms being hit by a piece of malware and says the incident may result in disruptions to business operations. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Justin Fier's picture
The rapid shift toward hyper-connected “smart” ports is rendering physical harbors susceptible to traditionally digital threats.
Barak Perelman's picture
Many organizations with OT networks face a massive challenge to maintain operational efficiency and improve network security at the same time.
Jalal Bouhdada's picture
It pays to be ahead of regulators, because if you’re aiming to be truly secure then you’ll already be meeting many of the key requirements of any local law.
Galina Antova's picture
The most successful organizations will be the ones that look at cyber risk holistically and build bridges between the IT, OT, and Security organizations.
Barak Perelman's picture
Concerns about endpoint security in industrial environments, especially among OT personnel, are being driven by the demise of the traditional air gapping of OT infrastructures.
Jalal Bouhdada's picture
Wireless IIoT solutions are fast to deploy, but companies must gauge whether they are an appropriate solution based on a number of different factors.
Jalal Bouhdada's picture
Building owners, suppliers and managers need to act to ensure the security of buildings and the private data they hold, and the safety of those within them.
Galina Antova's picture
Proper network segmentation is one of the most impactful actions industrial asset owners can take to reduce the risk of a major security incident.
Barak Perelman's picture
For industrial organizations, establishing an infrastructure that provides visibility, security, control, and is purpose-built for operational technologies (OT), is the clearest path to compliance.
Galina Antova's picture
In assessing industrial cyber risk and prioritizing your remediation steps, it can be difficult to even determine where to begin.