Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

Rail and metro cybersecurity company Cylus has raised $12 million in a Series A funding round, bringing the total amount raised by the company to date to $17 million. [Read More]
Cisco has agreed to acquire privately-held operational technology (OT) cybersecurity firm Sentryo for an undisclosed sum. [Read More]
Cisco has found several vulnerabilities, including one code execution flaw, in its Industrial Network Director product. [Read More]
Several vulnerabilities, including ones classified as “high risk,” have been found in APROL process control systems from B&R Industrial Automation. [Read More]
A new survey from Irdeto demonstrates that direct cyber-attacks against IIoT have already started, and that industry is not yet well prepared. [Read More]
Siemens has teamed up with Alphabet-owned cybersecurity company Chronicle to provide industrial monitoring and detection solutions for the energy sector. [Read More]
A vulnerability in Mitsubishi Electric MELSEC-Q PLCs exposes devices to remote DoS attacks. [Read More]
The wormable Windows RDS vulnerability patched recently by Microsoft (CVE-2019-0708), including in Windows XP and Server 2003, poses a serious risk to industrial environments. [Read More]
Microsoft patches nearly 80 vulnerabilities with its May 2019 Patch Tuesday updates, including a zero-day and a wormable RDS flaw that can be exploited for WannaCry-like attacks. [Read More]
Siemens’ May 2019 Patch Tuesday advisories address over a dozen vulnerabilities, including serious flaws affecting LOGO and SINAMICS Perfect Harmony products. [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Seema Haji's picture
As OT environments evolve, security is key to thwarting attacks with the potential to cause large and costly disruptions.
Jalal Bouhdada's picture
By deploying robots with cybersecurity in mind we can ensure that they don’t run the danger of introducing the same negative effects into their environment.
Seema Haji's picture
Failing to implement the right security controls could open the door for attacks and disruption that threatens system availability and performance — the very reasons for leveraging the power of IoT in the first place.
Barak Perelman's picture
Passive network security monitoring has its value for identifying certain indicators of compromise (IoC), but does not detect and mitigate all attacks or incidents on ICS networks.
Jalal Bouhdada's picture
Protecting global transport networks should be a priority for operators, governments and cybersecurity professionals.
Seema Haji's picture
The risk created by the proliferation of industrial IoT (IIoT) is rising, thanks to the continued mismanagement of third-party involvement in sensitive industrial environments.
Dean Weber's picture
Examining the Triton attack toolkit and methodology behind it offers industrial manufacturers and OEMs, plant safety teams and IT/OT teams more insight into what they need to do to get ahead of hardening their networks
Seema Haji's picture
Smart IoT devices in industrial settings, such as energy, oil/gas and manufacturing, have shifted the perspective on OT environments from being reactive to proactive and predict failures.
Galina Antova's picture
We’ve seen the discussion moving away from an active vs. passive debate to one seeking a more balanced approach that integrates the right mix of detection technologies.
Barak Perelman's picture
Just as internet security was a relative unknown concern 20 years ago, public awareness of threats to the electric grid, water supplies, etc. is mounting