Security Experts:

SCADA / ICS
long dotted

NEWS & INDUSTRY UPDATES

High severity vulnerabilities affecting Siemens’ TIA Portal automation tool can be exploited by threat actors to move laterally in ICS environments [Read More]
Critical vulnerabilities discovered in smart city systems can be exploited by hackers to cause panic, researchers warn [Read More]
High volume of malicious internal reconnaissance and lateral movement observed in the manufacturing industry, reports threat detection firm Vectra [Read More]
North American Electric Reliability Corporation (NERC) announced that Bill Lawrence has been named vice president and chief security officer (CSO), effective August 16, 2018. [Read More]
iS5 Communications (iS5Com), a provider of networking and cybersecurity solutions for industrial systems, has raised roughly $17 million (CDN $22 million) in funding. [Read More]
Security firm Cybereason established a sophisticated honeypot masquerading as a power transmission substation to attract attackers and analyze how they operate against the energy sector of the critical infrastructure. [Read More]
Likely operating out of Iran, the Leafminer cyber-espionage group has been targeting entities in the United States, Europe, Middle East, and East Asia, industrial cybersecurity firm Dragos warns. [Read More]
A new wave of spear-phishing emails masquerading as legitimate procurement and accounting letters have hit over 400 industrial organizations, according to Kaspersky Lab. [Read More]
AVEVA, which recently merged with Schneider Electric and took over the Wonderware products, patched critical vulnerabilities in the InduSoft and InTouch HMI/SCADA tools [Read More]
ABB is working to patch a serious arbitrary code execution vulnerability in its Panel Builder 800 tool. Until a fix becomes available, the company has provided some mitigations [Read More]

FEATURES, INSIGHTS // SCADA / ICS

rss icon

Jalal Bouhdada's picture
Wireless IIoT solutions are fast to deploy, but companies must gauge whether they are an appropriate solution based on a number of different factors.
Ashley Arbuckle's picture
Whether you work with in-house security resources or outside consultants, security experts are essential to help uncover vulnerabilities and offer recommendations to prioritize and mitigate risks.
Jalal Bouhdada's picture
Building owners, suppliers and managers need to act to ensure the security of buildings and the private data they hold, and the safety of those within them.
Galina Antova's picture
Proper network segmentation is one of the most impactful actions industrial asset owners can take to reduce the risk of a major security incident.
Barak Perelman's picture
For industrial organizations, establishing an infrastructure that provides visibility, security, control, and is purpose-built for operational technologies (OT), is the clearest path to compliance.
Laurence Pitt's picture
Safeguarding emerging IoT ecosystems involves embedding visibility and protection into the fabric of the IoT network.
Galina Antova's picture
In assessing industrial cyber risk and prioritizing your remediation steps, it can be difficult to even determine where to begin.
Bradon Rogers's picture
Industrial IoT in the enterprise expands the threat landscape by opening up new vulnerabilities that can be exploited across endpoints, applications, cloud infrastructure and networks.
Jalal Bouhdada's picture
Jalal Bouhdada, Founder and Principal ICS Security Consultant at Applied Risk, discusses the physical and cyber security threats facing the increasingly smart car.
Barak Perelman's picture
The new connectivity between IT and OT has created a clear and present cyber threat to previously isolated ICS environments.